Portfolio
Intentionally desktop-first — best experienced on a workstation
Threat Intelligence Analysis

The Hiring Trap
How Job Search Tools Became a National Security Exposure

A first-person analysis of how a broken hiring process is pushing job seekers — including defense industry professionals — into installing browser extensions with surveillance-level access to their entire digital life.

Analyst
Yana Ivanov
Published
March 2026
Classification
Public — Educational
Extension Analyzed
Jobright Autofill v1.3.1
Audience
Defense Contractors · HR Teams · Job Seekers
Evidence
Manifest.json · First-Person Experience
500K+ job seekers installed this extension  ·  Manifest grants access to every website you visit  ·  Three content scripts run on all URLs
Section 01

The Job Market Nobody Warned You About

I installed Jobright because I was applying to a lot of jobs and being asked for the same information over and over again. Name, address, phone number, work history, education — the same fields on every form, on every platform, for every company. Automating that process was not laziness. It was the only rational response to a hiring system that had become a second full-time job.

For those who haven't been in the job market recently, the change is significant. There was a time — not long ago — when looking for work was a human process on both sides. You had one resume. You sent it to a company. Someone read it, called you in, and you either got the job or you didn't. The process was imperfect but legible. You knew what was happening and why.

That world is gone. Today's job market is one of the most psychologically exhausting environments a professional can navigate. Hundreds of qualified candidates compete for a single position, with no acknowledgment, no feedback, and no human contact unless you clear an AI filter that most applicants never knew existed.

The AI Layer Changed Everything

Applicant Tracking Systems now screen resumes for keyword matches before a human ever reads them. A candidate with fifteen years of relevant experience gets automatically rejected because they used "led" instead of "managed," or because their resume format confused the parser. The response from job seekers was rational and predictable: maintain multiple versions of a resume tailored to different job description keywords, optimizing for machines rather than for humans. The resume stopped being a document that represented a person and became a keyword delivery mechanism.

The interviews that follow — when they happen — are often no more human than the initial filter. AI-conducted phone screens ask scripted questions with no room for dialogue. Pre-recorded video interviews require answering questions into a camera with no interviewer present, no ability to ask your own questions, and no feedback afterward. Some companies ask candidates to complete multi-hour technical projects, or to record themselves explaining their thought process through a complex problem — and then disappear entirely without response.

The AI training data concern: When a company asks you to record yourself explaining your thought process, consider carefully what they are collecting. Your voice. Your face. Your reasoning patterns. Your professional identity on camera. Before I understood the security implications, I declined these requests because I didn't want to help train AI to replace me. That instinct was correct — but the risk goes further than job replacement. A recording of your voice, face, and professional reasoning is a complete package for deepfake creation. Name, appearance, vocal patterns, behavioral cues — everything needed to impersonate you convincingly in a video call, a voice message, or a synthetic media attack. Most people who decline these requests do so for career reasons. Few think about what the recording could be used for once it leaves the interview platform.

The result is a workforce that has learned to treat the job search as a logistics problem to be optimized — and that optimization has created a security exposure that most organizations have not begun to account for. When applying for jobs feels like a full-time job, people stop scrutinizing the tools they use to manage it. That is the opening the threat operates through.

Section 02

What the Extension Actually Requests

Jobright Autofill is trusted by over 500,000 job seekers according to its own Chrome Web Store listing. Its stated purpose is simple: fill out job application forms automatically so you don't have to type the same information repeatedly. To do that, the extension needs to know what to fill — your name, your contact details, your work history. It needs to be able to interact with web forms. That is a narrow, well-defined technical requirement.

The manifest.json file — the document that declares what an extension is allowed to do — tells a different story. This is not speculation or inference. This is the actual file installed on the machines of half a million job seekers, read directly from the extension folder.

manifest.json — Jobright Autofill v1.3.1 — Actual Permissions
"permissions": [ "tabs", ← See every tab you have open — URL, title, status — at all times "cookies", ← Read and write cookies for ANY website, including session tokens "scripting", ← Inject and execute JavaScript on any webpage you visit "declarativeNetRequest", ← Intercept, block, or redirect network requests "storage", ← Store data locally on your machine "activeTab" ← This is the only permission actually needed for autofill ], "host_permissions": [ "http://*/*", ← Every HTTP website on the internet "https://*/*", ← Every HTTPS website on the internet "<all_urls>" ← All URLs, explicitly stated a third time ], "content_scripts": [ { "matches": ["<all_urls>"], "js": ["constants.js"] }, ← Script 1: runs on every website { "matches": ["<all_urls>"], "js": ["filler.js"] }, ← Script 2: runs on every website { "matches": ["<all_urls>"], "js": ["contents.js"] } ← Script 3: runs on every website ]

Three separate JavaScript files running on every single website you visit — not just job boards, not just application forms, but every website. The filler script has a plausible function. The other two have no stated purpose in the manifest. The extension's marketing says it helps you apply to jobs. The manifest says it runs code on your banking website, your email, your medical portal, and this page.

The Minimum Necessary Comparison

To autofill a name and email address into a job application form, an extension needs exactly one permission: activeTab — access to the tab you are currently viewing, only while you are viewing it, only when you click the extension. That is the minimum necessary permission for the stated function.

Jobright requests tabs (all tabs, always), cookies (all websites), scripting (execute code anywhere), and three content scripts running persistently on all URLs. The gap between what is needed and what is requested is not a minor technical discrepancy. It is the difference between a key to one room and a master key to every room in the building.

tabs — Read all browser tabs

Grants access to the URL, title, and status of every tab you have open at any time. Not just during a job application — constantly. This means the extension can see that you have your bank open, your email open, your health portal open, and any other page you visit.

Not needed for autofill
cookies — Read and write all site cookies

Cookies include session tokens — the credential that keeps you logged into websites without re-entering your password. An extension with cookie access to all URLs can read the session token for your email, your LinkedIn account, your bank, or any other site you are logged into.

Not needed for autofill
content_scripts on <all_urls> × 3

Three JavaScript files that execute on every website you visit, automatically, without any action on your part. One file can plausibly be the autofill mechanism. The purpose of the other two is not stated. Code running on every page you visit can read everything on that page.

One script maximum needed
activeTab — Access the current tab on click

The only permission that is genuinely necessary for autofill functionality. Grants access to the current tab only when the user clicks the extension icon. Scoped, intentional, and user-initiated.

Legitimate — needed

The Settings That Exist But Nobody Finds

Chrome does expose controls for extension permissions — buried under the extension's Details page in Developer mode. There, a user can find that Jobright is set to access all sites by default, and can theoretically restrict it. Chrome itself provides a warning on that same page: "Google Chrome cannot prevent extensions from recording your browsing history." The control exists. The disclosure exists. But it is several layers of navigation past where any ordinary user would look, the default is maximum access, and Chrome is admitting its own limitations in the same breath.

Disclosure that is technically present but practically invisible is not meaningful disclosure. The permissions are disclosed. Half a million people installed the extension without reading them — not because they are careless, but because the hiring process had made them desperate enough to click install without reading the fine print. That is the exploitation model.

Section 03

The Data Flowing Through the Hiring Process

The extension is one layer of a larger data collection ecosystem that activates the moment someone begins a job search. Every platform, every form, and every interaction in the modern hiring process generates data — and that data flows to more parties than the applicant ever intended.

01
Job Platforms — LinkedIn, Indeed, and the Aggregators

Every application submitted through a job platform is logged — by the platform, by the ATS that receives it, and often by analytics tools embedded in both. LinkedIn's business model is built in part on connecting recruiter demand with candidate supply. Your profile, your search behavior, your application history, and your inferred career trajectory are the product. The same data that makes LinkedIn useful to legitimate recruiters makes it equally useful to anyone else who can access it — through scraping, through data purchases, or through the platform's own advertising and partnership infrastructure.

02
ATS Platforms — Third-Party Systems You Never Agreed To

Most companies do not receive your application directly. It goes to a third-party Applicant Tracking System — Workday, Greenhouse, Lever, iCIMS, Ashby. You are agreeing to that platform's terms of service, whether you read them or not, when you submit an application. These platforms have had security incidents. The data you submitted to a company that never called you back is sitting in an ATS database you have no visibility into and no ability to delete from.

03
Fake Job Postings — Data Harvesting at Scale

The FBI has documented and warned against fake job postings specifically designed to collect applicant data. A posting on a legitimate job board costs little to place. Hundreds of qualified applicants respond with their full personal and professional profiles. The "company" collects the data, never contacts the applicants, and the information enters a market where it can be sold, used for targeted phishing, or provided to foreign intelligence collection operations. The job board profits from the posting fee regardless of whether the job is real. Their financial incentive to police fake listings is limited.

04
Autofill Extensions — Persistent Access After the Search Ends

Unlike the other layers, which are activated only during specific interactions, a browser extension with content scripts running on all URLs does not stop when the job search ends. It continues running on every page you visit, every day, for as long as the extension remains installed. The job search was temporary. The access it granted is not.

The spam as evidence: After an active job search period, I began receiving a significant increase in unsolicited contact — text messages offering implausible earnings, emails from individuals claiming to be HR representatives at companies I had applied to, calls from recruiters with no connection to any role I had pursued. This is consistent with personal data entering a secondary market. It does not confirm which specific platform or tool was the source. But the timing and volume were not coincidental, and the pattern — name, phone, email, professional context, all clearly derived from a resume — suggests data that was submitted as part of a job application found its way somewhere it was not intended to go.

Section 04

The Defense Contractor Exposure

For most job seekers, the worst outcome from this data ecosystem is spam — unwanted calls, fraudulent recruiter outreach, targeted advertising. That is a real harm, but it is a personal one. For professionals working in or seeking to work in national security and defense, the exposure is categorically different.

A resume submitted through a job platform or autofill extension does not merely contain personal contact information. For a defense professional, it is an intelligence document. It identifies who is currently seeking access to sensitive programs. It reveals what clearance level the candidate likely holds based on their prior employment. It shows which programs and facilities they have worked within. It indicates when they are in career transition — which is when people are most vulnerable to approach. And it provides the full professional context needed to craft a highly targeted social engineering attempt that will be indistinguishable from a legitimate opportunity.

Army Intelligence Warning — November 2025: Lt. Gen. Anthony Hale, Army deputy chief of staff for intelligence, issued a memo to over one million soldiers and civilians warning that foreign intelligence entities are actively using employment sites and social media platforms to identify and approach individuals seeking new employment. The memo specifically noted that adversaries look for individuals "expressing dissatisfaction or describing financial insecurity" — the exact profile of someone in the middle of a difficult job search. This is not a theoretical future threat. It is documented current activity.

The Attack Scenario

Consider a software engineer at a defense contractor who spent six months job searching before accepting their current role. During that search they used a resume autofill extension, submitted applications to dozens of companies through LinkedIn and Indeed, and uploaded their resume to several platforms. Their data — name, email, phone, work history including the defense contractor, clearance indicators from program names, skills — now exists in multiple databases with varying security postures and unknown data sharing practices.

A foreign intelligence service with access to job seeker data — through purchase, through breach of an ATS platform, or through their own fake job posting operation — can now identify this individual as a current employee at a defense contractor with likely clearance. They know their career trajectory, their areas of expertise, and the fact that they were actively looking to leave a year ago — suggesting potential dissatisfaction. They have a phone number and personal email address that predates any corporate security monitoring.

The approach does not need to be a clumsy phishing email. It can be a LinkedIn message from a convincing profile at a company the target would genuinely want to work for. It can be a recruiter call to their personal cell. It can be a tailored job offer that references their exact skill set and career goals, because that information was collected through the job search they conducted a year ago. The target never connected their old job search behavior to the approach they are receiving today.

Data Type in Resume / ApplicationIntelligence ValueAttack Use
Full legal name + personal email + phoneCriticalDirect contact channel outside corporate monitoring
Current / recent employer nameCriticalIdentifies cleared contractor — targeting priority established
Program names and project descriptionsCriticalReveals which classified or sensitive programs accessed
Skills and technical specializationsHighIdentifies value of access — what knowledge to extract
Career timeline and transition datesHighIdentifies when vulnerability window opened — target when in transition
Education and certificationsHighRefines clearance level assessment and professional credibility
References listedHighMaps professional network — identifies colleagues to also approach
Salary expectationsMediumCalibrates financial offer to make it attractive without being suspicious
Section 05

Check Your Own Extensions

The analysis above is based on reading the manifest.json file of an installed extension — a file that is sitting on your machine right now for every extension you have installed. You do not need special tools or technical training to read it. The information is there. Most people have never looked at it.

The scanner below reads a manifest.json file and tells you in plain language what each permission means and whether it is necessary for the extension's stated purpose. Extract the file from any Chrome extension on your machine and drop it in.

Extension Permission Scanner Runs in browser · No file uploaded anywhere
How to extract your extension's manifest.json
  1. Open Chrome and go to chrome://extensions
  2. Enable Developer mode using the toggle in the top-right corner
  3. Find the extension you want to check — click Details — copy the Extension ID from the URL
  4. Open Finder → Go menu → Go to Folder → paste: ~/Library/Application Support/Google/Chrome/Default/Extensions/[ID]
  5. Open the highest version number folder — find manifest.json — drag it into the drop zone below
Drop manifest.json here
From any Chrome extension folder · Click to browse
Scan Output
Drop a manifest.json file above and click Scan to analyze extension permissions…

This tool runs entirely in your browser. The manifest.json file is read locally and never transmitted anywhere. For a complete scan of an extension's JavaScript source code for invisible Unicode and suspicious patterns, use the Glassworm Detector.

Section 06

What Should Change

For Individuals

Before installing any browser extension, open the Chrome Web Store listing and click the privacy disclosure at the bottom. Look at what data the developer says they collect. Then open the extension's Details page after installing and check what permissions it actually has — the two should match. If an autofill tool says it collects only what is necessary but its manifest requests access to all tabs and all cookies, that inconsistency is information.

Extensions installed during a job search do not automatically become less risky after the search ends. If you no longer need an extension, remove it. The access it holds does not expire when your need for it does.

For Defense Contractors and Security Teams

The insider threat and foreign targeting problem does not begin when an employee joins the organization. It begins during the hiring process — and in some cases, years earlier, during a previous job search. Personnel security programs that focus exclusively on behavior after hire are missing the upstream exposure that the hiring process creates.

A policy that addresses which browser extensions employees may use on personal devices that also access corporate networks is not an overreach. It is the specific, technically grounded control that addresses a documented intelligence collection methodology. The Army issued that guidance to a million personnel. Defense contractors should not wait for a mandate to implement the same thinking.

CMMC connection: NIST 800-171 control 3.1.19 requires organizations to protect CUI on mobile devices. Control 3.13.1 requires monitoring communications at system boundaries. Neither was written with browser extensions in mind — but both speak to the principle that data leaving an authorized perimeter through an unmonitored channel is a compliance gap. An employee whose personal browser extension is reading every page they visit, including internal web applications accessible through a VPN, is a boundary that is not being monitored.

For the Hiring Industry

The broken hiring process is not an accident. It is the product of optimizing for volume and efficiency at the expense of the human experience on both sides. AI filters, ghost interviews, pre-recorded video submissions, and disposable candidate data exist because they reduce cost for the company — and because job seekers in a difficult market have limited ability to refuse. The security consequences of this optimization are being paid by the people who could least afford to consider them: the job seekers themselves.

Meaningful disclosure of data practices — before the application form is opened, not buried in a terms of service agreement that nobody reads — is a minimum standard that the industry has not adopted voluntarily and that regulators have been slow to enforce. The data that job seekers generate in the course of looking for work deserves the same protection as any other sensitive personal information. It is, in many cases, far more sensitive.

The manifest.json analysis in this report is based on direct inspection of Jobright Autofill v1.3.1 installed on the author's machine. Extension permission descriptions are based on official Chrome extension API documentation. Army intelligence warning sourced from Nextgov/FCW reporting on Lt. Gen. Anthony Hale's November 2025 memo. FBI fake job posting warnings sourced from FBI El Paso field office public reporting. This report represents the author's independent analysis based on personal experience and publicly documented evidence. This report does not assert that Jobright.ai has engaged in malicious activity. It presents the extension's declared permissions as documented evidence and invites readers to evaluate whether those permissions are proportionate to the stated function.

YI
Yana Ivanov
Security Analyst  ·  CMMC Compliance Analyst  ·  SiteWave Studio

Yana Ivanov is a security analyst and CMMC consultant based in Connecticut, specializing in cybersecurity risk assessment for defense contractors in the Connecticut defense industrial base. With 15 years of enterprise technology experience and an MS in Information Systems, she brings a practitioner perspective to threat intelligence analysis. She is currently pursuing CompTIA Security+ and CMMC Registered Practitioner certification, with a focus on helping defense supply chain companies achieve genuine — not checkbox — security compliance. This analysis was produced independently as a contribution to the security community's understanding of active threats against US defense infrastructure.

Portfolio