awRAG.io ์ ์์: awRAG.io
Connect your awRAG.io documents to any AI platform - Claude, ChatGPT, Perplexity, Gemini, and more. Upload once, query everywhere.
์ฌ์ฉ์ ์์์ฌ์ฉ์ ์์
ํ์ฅ ๋ฉํ ๋ฐ์ดํฐ
์ ๋ณด
awRAG.io breaks AI vendor lock-in by providing universal document search across all major AI platforms.
How It Works:
1. Upload documents to awRAG.io (PDF, Word, text files)
2. Install this extension
3. Use the floating button or keyboard shortcut (Ctrl+Shift+L) on any supported AI platform
4. Search your documents and inject context directly into your AI conversations
Supported Platforms:
โข Claude.ai
โข ChatGPT
โข Perplexity AI
โข Google Gemini
โข Google NotebookLM
Key Features:
โข Floating action button for instant access
โข Keyboard shortcut for power users
โข Context injection with source citations
โข No vendor lock-in - your documents work with any AI
โข Privacy-first: API key stored locally only
Privacy & Security:
โข No data collection or tracking
โข API key stored in browser storage only
โข No analytics or telemetry
โข Open source (available for review)
Requirements:
โข Free or paid awRAG.io account (https://awrag.io)
โข API key from your awRAG.io dashboard
Use Cases:
โข Research with academic papers
โข Customer support with knowledge bases
โข Legal document analysis
โข Technical documentation queries
โข Personal knowledge management
REGARDING innerHTML WARNINGS
Mozilla's automated validator flagged 3 "Unsafe assignment to innerHTML" warnings. Here's the explanation:
Why These Warnings Appear
All flagged innerHTML assignments are in React framework code (bundled by webpack), NOT in our source code.
Source files use safe React patterns:
- JSX syntax with automatic XSS escaping
- No
- No direct DOM manipulation with
- All user input sanitized through React's virtual DOM
The warnings appear because:
1. React-DOM library uses
2. Webpack bundles React-DOM into single files (
3. Mozilla's linter detects
4. React handles all sanitization internally - this is framework-level code
Security Verification
Our source code follows Mozilla's security best practices:
- All DOM updates through React components
- User input never directly inserted into DOM
- TypeScript strict mode enforces type safety
- No eval(), Function(), or other dangerous APIs used
This is a known issue for ALL React-based extensions:
- React, Vue, Svelte, and other framework extensions get these warnings
- The warnings are from framework internals, not developer code
- Mozilla reviewers are familiar with this pattern
Source Code Reference
You can verify our source code (included in source ZIP):
-
-
-
All innerHTML warnings are in bundled output (
ADDITIONAL INFORMATION
Browser Compatibility
Source Code
Support & Contact
Privacy Policy
QUESTIONS FOR REVIEWERS
If you have any questions during review:
1. Check source code in provided ZIP
2. Verify innerHTML usage (framework only, not our code)
3. Test with provided credentials
4. Contact us if clarification needed
How It Works:
1. Upload documents to awRAG.io (PDF, Word, text files)
2. Install this extension
3. Use the floating button or keyboard shortcut (Ctrl+Shift+L) on any supported AI platform
4. Search your documents and inject context directly into your AI conversations
Supported Platforms:
โข Claude.ai
โข ChatGPT
โข Perplexity AI
โข Google Gemini
โข Google NotebookLM
Key Features:
โข Floating action button for instant access
โข Keyboard shortcut for power users
โข Context injection with source citations
โข No vendor lock-in - your documents work with any AI
โข Privacy-first: API key stored locally only
Privacy & Security:
โข No data collection or tracking
โข API key stored in browser storage only
โข No analytics or telemetry
โข Open source (available for review)
Requirements:
โข Free or paid awRAG.io account (https://awrag.io)
โข API key from your awRAG.io dashboard
Use Cases:
โข Research with academic papers
โข Customer support with knowledge bases
โข Legal document analysis
โข Technical documentation queries
โข Personal knowledge management
REGARDING innerHTML WARNINGS
Mozilla's automated validator flagged 3 "Unsafe assignment to innerHTML" warnings. Here's the explanation:
Why These Warnings Appear
All flagged innerHTML assignments are in React framework code (bundled by webpack), NOT in our source code.
Source files use safe React patterns:
- JSX syntax with automatic XSS escaping
- No
dangerouslySetInnerHTML usage anywhere in codebase- No direct DOM manipulation with
innerHTML- All user input sanitized through React's virtual DOM
The warnings appear because:
1. React-DOM library uses
innerHTML internally for performance optimization2. Webpack bundles React-DOM into single files (
popup.js, content.js)3. Mozilla's linter detects
innerHTML in bundled code (not source)4. React handles all sanitization internally - this is framework-level code
Security Verification
Our source code follows Mozilla's security best practices:
- All DOM updates through React components
- User input never directly inserted into DOM
- TypeScript strict mode enforces type safety
- No eval(), Function(), or other dangerous APIs used
This is a known issue for ALL React-based extensions:
- React, Vue, Svelte, and other framework extensions get these warnings
- The warnings are from framework internals, not developer code
- Mozilla reviewers are familiar with this pattern
Source Code Reference
You can verify our source code (included in source ZIP):
-
src/popup/index.tsx - React components with JSX (no innerHTML)-
src/content/index.ts - Safe DOM manipulation via React-
src/background/index.ts - Background script (no DOM access)All innerHTML warnings are in bundled output (
dist/popup.js, dist/content.js), not source files.ADDITIONAL INFORMATION
Browser Compatibility
- Primary: Firefox 140+ (this build)
- Chrome: Separate build available (different manifest structure)
Source Code
- Source code ZIP included with submission
- Build instructions in README.md
- TypeScript + React + Webpack stack
Support & Contact
- Website: https://awrag.io
- Email: [YOUR SUPPORT EMAIL]
- GitHub: [YOUR GITHUB REPO IF PUBLIC]
Privacy Policy
- Available at: https://awrag.io/privacy
- No data collection, no tracking, no analytics
- API key stored locally only
QUESTIONS FOR REVIEWERS
If you have any questions during review:
1. Check source code in provided ZIP
2. Verify innerHTML usage (framework only, not our code)
3. Test with provided credentials
4. Contact us if clarification needed
0๋ช
์ด 0์ ์ผ๋ก ํ๊ฐํจ
๊ถํ ๋ฐ ๋ฐ์ดํฐ
ํ์ ๊ถํ:
- ํด๋ฆฝ๋ณด๋์ ๋ฐ์ดํฐ ๋ฃ๊ธฐ
- claude.ai์์ ์ฌ์ฉ์์ ๋ฐ์ดํฐ์ ์ ๊ทผ
- chatgpt.com์์ ์ฌ์ฉ์์ ๋ฐ์ดํฐ์ ์ ๊ทผ
- perplexity.ai์์ ์ฌ์ฉ์์ ๋ฐ์ดํฐ์ ์ ๊ทผ
- www.perplexity.ai์์ ์ฌ์ฉ์์ ๋ฐ์ดํฐ์ ์ ๊ทผ
- gemini.google.com์์ ์ฌ์ฉ์์ ๋ฐ์ดํฐ์ ์ ๊ทผ
- notebooklm.google.com์์ ์ฌ์ฉ์์ ๋ฐ์ดํฐ์ ์ ๊ทผ
์ ํ์ ๊ถํ:
- claude.ai์์ ์ฌ์ฉ์์ ๋ฐ์ดํฐ์ ์ ๊ทผ
- chatgpt.com์์ ์ฌ์ฉ์์ ๋ฐ์ดํฐ์ ์ ๊ทผ
- perplexity.ai์์ ์ฌ์ฉ์์ ๋ฐ์ดํฐ์ ์ ๊ทผ
- www.perplexity.ai์์ ์ฌ์ฉ์์ ๋ฐ์ดํฐ์ ์ ๊ทผ
- gemini.google.com์์ ์ฌ์ฉ์์ ๋ฐ์ดํฐ์ ์ ๊ทผ
- notebooklm.google.com์์ ์ฌ์ฉ์์ ๋ฐ์ดํฐ์ ์ ๊ทผ
- awrag.io์์ ์ฌ์ฉ์์ ๋ฐ์ดํฐ์ ์ ๊ทผ
๋ฐ์ดํฐ ์์ง:
- ๊ฐ๋ฐ์๊ฐ ์ด ํ์ฅ ๊ธฐ๋ฅ์ ๋ฐ์ดํฐ ์์ง์ด ํ์ํ์ง ์๋ค๊ณ ํฉ๋๋ค.
์ถ๊ฐ ์ ๋ณด
- ๋ถ๊ฐ ๊ธฐ๋ฅ ๋งํฌ
- ๋ฒ์
- 1.4.1
- ํฌ๊ธฐ
- 80.75 KB
- ๋ง์ง๋ง ์ ๋ฐ์ดํธ
- ํ ๋ฌ ์ (2025๋ 12์ 4์ผ)
- ๊ด๋ จ ์นดํ ๊ณ ๋ฆฌ
- ๋ผ์ด์ ์ค
- All Rights Reserved
- ๊ฐ์ธ์ ๋ณด์ฒ๋ฆฌ๋ฐฉ์นจ
- ์ด ๋ถ๊ฐ ๊ธฐ๋ฅ์ ๋ํ ๊ฐ์ธ์ ๋ณด์ฒ๋ฆฌ๋ฐฉ์นจ ์ฝ๊ธฐ
- ๋ฒ์ ๋ชฉ๋ก
- ๋ชจ์์ง์ ์ถ๊ฐ