VSCode IDE Forks Expose Users to Recommended Extension Attacks

Related

CISOs to Watch in Canadian Manufacturing

Canada’s manufacturing sector spans aerospace, automotive, food production, forestry,...

CISOs to Watch in Canadian Mining & Natural Resources

Canada’s mining and natural resources sector is a global...

CISOs to Watch in Canadian Energy & Utilities

Canada’s energy and utilities sector underpins national resilience, economic...

VoiceRun’s $5.5M Seed Round Signals Enterprise Voice AI Maturation

What happened VoiceRun, a Cambridge, Massachusetts–based startup offering a code‑first...

Pax8 Email Error Exposes MSP Partner Licensing and Customer Lists

What happened A Pax8 email error exposes MSP partner licensing...

Share

What happened

VSCode IDE forks expose users to recommended extension attacks due to unsafe extension recommendation behavior. Researchers at Koi Security discovered that several AI-powered Visual Studio Code forks, including Cursor, Windsurf, Google Antigravity, and Trae, use hardcoded extension recommendations that reference namespaces not registered in the OpenVSX marketplace. Attackers could claim those namespaces and publish malicious extensions that appear as trusted recommendations inside the IDEs. While Microsoft’s official Visual Studio Code distribution is not affected, developers using these forks could unknowingly install malicious extensions capable of credential theft or code execution.

Who is affected

Developers and organizations using unofficial VSCode forks that rely on OpenVSX for extension distribution.

Why CISOs should care

Developer tooling represents a high-impact supply-chain attack surface that can expose source code and CI/CD pipelines.

3 practical actions

1. Standardize IDE usage: Require developers to use approved, official IDE distributions only.

2. Control extensions: Enforce allowlists and restrict installation of unverified extensions.

3. Monitor developer endpoints: Detect anomalous extension behavior or outbound connections.