Credential ExfilPublished Mar 17, 2026

Extension with MV3 host permissions reads cookies for AI vendor sites

CriticalAARM tierConfirmed
Seen28times across6customers
jiffy-ti-2026-000097

Summary

Extension requests host_permissions for claude.ai and chat.openai.com and uses chrome.cookies to read the session cookie, then POSTs it off-host. Permitted by MV3 APIs; still a severe credential-exfil primitive.

Severity & confidence

Severity
Critical

Critical

Active exploitation in the wild, high blast radius, or direct data exfiltration vector. Treat as an urgent remediation target; quarantine affected artifacts immediately.

Confidence
Confirmed

Confirmed

Observed directly by Jiffy scanners or validated by multiple independent sources. Indicators are reliable enough to drive automated action.

Indicators

Observed patterns and artifacts associated with this entry. Each indicator can be copied into your detection stack or SIEM.

  • (?i)chrome\.cookies\.get
  • (?i)host_permissions.{0,200}(?:claude\.ai|chat\.openai\.com)

Detection rule

A YARA-style pseudo-rule auto-generated from the indicators above. Useful as a starting point — adapt the syntax for your target detection platform.

YARA-style pseudo-rule
rule jiffy_ti_2026_000097
{
    meta:
        source = "jiffy-intel"
        severity = "critical"
        description = "Auto-generated from Jiffy Intel indicators"
    strings:
    $content_pattern_0 = "(?i)chrome\\.cookies\\.get"
    $content_pattern_1 = "(?i)host_permissions.{0,200}(?:claude\\.ai|chat\\.openai\\.com)"
    condition:
        $content_pattern_0 or $content_pattern_1
}

Auto-generated from the indicators above. Adapt syntax for your detection stack before deploying.

Affected tools

ToolVersionsStatus
Chrome / Chromium*vulnerable
ChatGPT (GPT Store)*vulnerable
claude.ai (Projects)*vulnerable

Example artifacts

Sanitized examples of artifacts Jiffy has observed exhibiting this pattern. Publisher handles are redacted; version ranges and status reflect the most recent scan.

  • AI Assistant HubExtension
    Removed
    Source
    Chrome Web Store
    First observed
    Mar 1, 2026
    Last observed
    Mar 28, 2026
  • Chat ToolkitExtension
    Removed
    Source
    Firefox Add-ons
    First observed
    Mar 5, 2026
    Last observed
    Mar 31, 2026

How to remediate

  1. 01Revoke browser session tokens for affected AI sites.
  2. 02Reinstall extensions via a known-clean account.
  3. 03Block AI-vendor host_permissions at EDR layer.

Timeline & sources

Timeline

  1. First observedMar 1, 20261 month ago
  2. Last updatedApr 22, 2026today
  3. PublishedMar 17, 20261 month ago

Sources

scanner

References

Scan for patterns like this

Point Jiffy at your GitHub org, IDE config, or a single artifact. Get a scored report in under a minute.

Start a free scan