Tarnish is a static-analysis tool to aid researchers in security reviews of Chrome extensions. It automates much of the regular grunt work and helps you quickly identify potential security vulnerabilities.
This tool accompanies the research blog post which can be found here. If you don’t want to go through the trouble of setting this up you can just use the tool by clicking here.
Unpolished Notice & Notes
It should be noted that this is an un-polished release. This is the same source as the deployment located at https://thehackerblog.com/tarnish/
. In the future I may clean this up and make it much easier to run but I don’t have time right now.
To set this up you’ll need to understand how to:
docker-compose
The set up is a little complex due to a few design goals:
Some quick notes to help someone attempting to set this up:
tarnish
makes use of Python Celery for analysis of extensions.t2.medium
instance to operate.tarnish
frontend is just a set of static files which is upload to a static web host configured S3 bucket.See the docker-compose.yaml.example
for the environment variable configs. Ideally you’d run ./start.sh
and navigate to the static frontend to get things running. You can use S3 for the static site or just a simple static webserver like python -m SimpleHTTPServer
(you’ll have to modify the JavaScript files to ensure origin matches, etc.
Also Read – SQLMap : Automatic SQL Injection & Database Takeover Tool
Pulls any Chrome extension from a provided Chrome webstore link.
manifest.json
viewer: simply displays a JSON-prettified version of the extension’s manifest.web_accessible_resources
and automatic generation of Chrome extension fingerprinting JavaScript.web_accessible_resources
directive set. These are potentially vulnerable to clickjacking depending on the purpose of the pages.web_accessible_resource
status.Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…
This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…
GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…
Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…
The free and open-source security platform SecHub, provides a central API to test software with…
Don't worry if there are any bugs in the tool, we will try to fix…