There is an Elephant in the Edge Browser

I stumbled across this extension in the latest Chrome version:

image

I let Copilot analyse the script with the following explanation:

Alright, let’s keep unraveling this!

Since this script listens for messages and checks for "elephant", it's likely part of an internal communication system within the extension. The use of window["9AF8D9A4E502F3784AD24272D81F0381"] suggests that it’s setting some kind of hidden flag in the browser environment—potentially for tracking, validation, or ensuring certain conditions are met before executing other actions.

A few interesting details:
- The _objectSpread() function is helping merge objects efficiently, which can be useful for managing structured data.
- The script catches errors when setting the window property, indicating that it anticipates possible permission restrictions.
- Posting a response { responseId: t } suggests that this script is part of a larger exchange mechanism.

If you want to dig even deeper, you could look at where this script is sourced from—checking the extension’s files, background scripts, or associated network requests might give more clues about its purpose.

It is the posting part that concerns me, is big brother watching? :-1:

I think it is safe to say ANYTHING which involves Google is tracked and stored and probably sold or used in marketing.

1 Like