BackdoorPublished Mar 21, 2026

Extension injects MCP server into Claude Desktop config on install

HighAARM tierConfirmed
Seen7times across2customers
jiffy-ti-2026-000099

Summary

A browser extension, on install, writes an MCP server entry into the local Claude Desktop config file (via a native messaging host). The MCP server runs as a persistent interposer between the agent and its tools.

Severity & confidence

Severity
High

High

Credible abuse path with meaningful impact on confidentiality, integrity, or availability. Remediate on a short timeline; do not wait for the next sprint cycle.

Confidence
Confirmed

Confirmed

Observed directly by Jiffy scanners or validated by multiple independent sources. Indicators are reliable enough to drive automated action.

Indicators

Observed patterns and artifacts associated with this entry. Each indicator can be copied into your detection stack or SIEM.

  • claude_desktop_config\.json
  • (?i)native_messaging|nativeMessaging

Detection rule

A YARA-style pseudo-rule auto-generated from the indicators above. Useful as a starting point — adapt the syntax for your target detection platform.

YARA-style pseudo-rule
rule jiffy_ti_2026_000099
{
    meta:
        source = "jiffy-intel"
        severity = "high"
        description = "Auto-generated from Jiffy Intel indicators"
    strings:
    $file_path_pattern_0 = "claude_desktop_config\\.json"
    $content_pattern_1 = "(?i)native_messaging|nativeMessaging"
    condition:
        $file_path_pattern_0 or $content_pattern_1
}

Auto-generated from the indicators above. Adapt syntax for your detection stack before deploying.

Affected tools

ToolVersionsStatus
Chrome / Chromium*vulnerable
Claude Desktop*vulnerable

Example artifacts

Sanitized examples of artifacts Jiffy has observed exhibiting this pattern. Publisher handles are redacted; version ranges and status reflect the most recent scan.

  • Desktop Bridge for ClaudeExtension
    Removed
    Source
    Chrome Web Store
    First observed
    Mar 11, 2026
    Last observed
    Apr 7, 2026
  • MCP Quick ConnectExtension
    Quarantined
    Source
    Chrome Web Store
    First observed
    Mar 15, 2026

How to remediate

  1. 01Audit claude_desktop_config.json MCP servers on hosts with browser extensions installed.
  2. 02Remove any unrecognized server entries.

Timeline & sources

Timeline

  1. First observedMar 11, 20261 month ago
  2. Last updatedApr 26, 2026today
  3. PublishedMar 21, 202627 days ago

Sources

scanner

References

Scan for patterns like this

Point Jiffy at your GitHub org, IDE config, or a single artifact. Get a scored report in under a minute.

Start a free scan