Description
Reviews (15 cached)
I have to give one start because i can't give zero star. Everything was fine until it forced me to donate.
asking money for a functionality that should be free...
taking a fee for this service is scam
The Image export is not working.
This extension is a sophisticated piece of malware disguised as a utility. I conducted a detailed static and dynamic analysis of its source code, and the findings are conclusive: this extension's primary purpose is to steal your Claude Organization ID and exfiltrate it to an attacker-controlled server. For anyone with a technical background, here is the proof: 1. Hardcoded Data Theft (`inj.js`): The extension injects a script (inj.js) directly into the claude.ai webpage. This script is not generic; it is purpose-built to traverse the page's React DOM and find a very specific internal property called lastActiveOrg. It then extracts the value of this propertyβyour Organization ID. 2. Covert Exfiltration Channel (`manifest.json`, `content.js`): Once the Organization ID is stolen, inj.js uses window.postMessage to send the data to the extension's content script (content.js). This script then relays the data to the background service worker (background.js). This multi-step process is a known technique for bypassing browser sandboxing and hiding malicious activity. 3. Attacker-Controlled Command & Control (C2) Server: The manifest.json file contains the most damning evidence. It declares host_permissions and externally_connectable for the domain https://*.claudexporter.com/*. This is NOT a legitimate Claude domain. This permission gives the extension the ability to send your stolen data to this attacker-controlled server. There is zero legitimate reason for a simple "exporter" tool to have this level of communication with a third-party server. 4. Sophisticated Anti-Analysis Techniques: When I attempted to intercept this malicious traffic using a local honeypot (by redirecting claudexporter.com to a local server via the hosts file), the extension refused to send the data. This proves that the obfuscated background.js script is performing SSL/TLS certificate validation. It checks if the certificate for the C2 server is legitimate and, if it detects a self-signed certificate (which is common in analysis environments), it aborts the connection to avoid being caught. This is not a feature of a benign tool; it is a classic evasion tactic used by malware. Conclusion: Do not be fooled by the user interface. This is a targeted, data-harvesting tool. The combination of specific data theft, a covert communication channel, a hardcoded C2 server, and anti-analysis techniques demonstrates that this is a dangerous and malicious piece of software. By installing this, you are sending your organization's unique identifier directly to an unknown, malicious third party. This could be used for corporate espionage, targeted phishing attacks, or other malicious activities. REMOVE THIS EXTENSION IMMEDIATELY.
This does not work. I am on the Claude.ai website and trying to use the extract tool but the only options that show up are: - Open Claude website - Contact support
downloads only chats NOT ARTIFACTS.. you MUST DOWNLOAD ARTIFACTS SEPARATELY!!!!
Please note that Artifacts are not working with this. Please support Artifacts being exported and surely this would be a 5-star extension! Update: Long-pasted texts and documents are also not supported in this. If half of my convo is lost in the export then it's kinda useless. Please update to support exporting everything and it'd be great.
Looks like malware. Why are there background requests to a third party API with a dedicated domain for this extension? Rendering should happen client side, there should not need to be an API for this extension. The other reviews are suspicious too, they're written with LLMs.
Not currently working for me. Error message says: Failed to export Markdown: get o id 1 error
Good tool, but also has paywalls for what should be built in features, when other extensions do this for free. Because of that I can't give it 5 stars, sorry chief.
I chose the mid range rating because when it works it is fabulous, but then it quits and can't be restarted. I used it in Claude, Gemini, and GPT very successfuly, then when I clicked select in Claude, the Select/Export options disappeared. "Service Worker" shows inactive. I tried toggling off/on and the Service worker apeares to return to normal, but as soon as I do anything "inactive" returns. When I changed to GPT and Gemini, the same thing happented and now all are inactive. All the nomal things, uninstall/install, reboot fail. A hard refresh worked for Gemini, but not Claude. What do you think?
Kinda nice - but only if all your artifacts are the same format. I have JS, CSS, MD... etc. in my artifacts. This extension is no different than clicking on each artifact and downloading it then. Was hoping for something that could export the artifacts as-is all at once (into a zip) or even individually with one run.
Not working "Failed to export Markdown: Cannot read properties of null (reading 'convoData')"
July 8, 2025. I am experiencing some kind of error that will no longer allow me to export threads in Claude. claude.ai says "Failed to export text: Cannot read properties of null (reading 'convoData')." I hope this bug can get fixed. Thanks!
Permissions (1)
Permissions
Details
| Version | 2.27.1 |
| Updated | Mar 26, 2026 |
| Size | 838KiB |
| First Seen | Mar 27, 2026 |