Eclipse Foundation Implements Mandatory Pre-Publish Security Checks for Open VSX Extensions

Related

Hackers Weaponized Open VSX Extension With Sophisticated Malware

What happened A malicious software extension distributed through the Open...

CISO Warning: “GlassWorm” Malware Hits VS Code Ecosystem

What happened Security researchers at Koi Security have uncovered a...

Malware Resurgence: “GlassWorm” Returns with New VS Code Extensions

What happened The malware campaign known as GlassWorm, which previously...

Share

What happened

The Eclipse Foundation announced it will begin enforcing mandatory security checks before Microsoft Visual Studio Code extensions can be published to its open‑source Open VSX Registry, shifting from reactive takedowns to proactive scanning to mitigate software supply chain risks.

Who is affected

Developers who publish or consume VS Code extensions via the Open VSX Registry and organizations that rely on these extensions in their development workflows are directly impacted by the new verification process. 

Why CISOs should care

Open source extension marketplaces have become frequent vectors for supply chain attacks, including namespace impersonation, typosquatting, and malicious payloads, posing risk to development environments and downstream applications; proactive pre‑publish checks can reduce the chance that malicious or unsafe extensions enter the ecosystem.

3 practical actions

  1. Review extension sources and dependencies: Inventory all VS Code extensions used in your organization and ensure they come from trusted publishers with a security review process.
  2. Integrate supply chain scanning: Deploy tools that automatically scan extension dependencies and artifacts for malicious patterns before use in development pipelines.
  3. Update development policies: Adjust internal secure development standards to require pre‑deployment verification of extensions, aligning with Eclipse Foundation’s new checks and broader supply chain security practices.
1524023125746
+ posts