VSCode IDE Forks Expose Users to Recommended Extension Attacks

Related

Pentagon CIO Kirsten Davies Announces New Team Appointments

What happened Pentagon Chief Information Officer Kirsten Davies announced several...

Carnival Corporation Probes Data Breach After Claims of 8.7 Million Records Theft

What happened Carnival Corporation is investigating a potential data breach...

Grinex Exchange Blames Western Intelligence for $13.7M Crypto Hack

What happened Kyrgyzstan-based cryptocurrency exchange Grinex suspended operations on April...

Payouts King Ransomware Uses QEMU VMs to Bypass Endpoint Security

What happened Sophos researchers have documented two active campaigns in...

Share

What happened

VSCode IDE forks expose users to recommended extension attacks due to unsafe extension recommendation behavior. Researchers at Koi Security discovered that several AI-powered Visual Studio Code forks, including Cursor, Windsurf, Google Antigravity, and Trae, use hardcoded extension recommendations that reference namespaces not registered in the OpenVSX marketplace. Attackers could claim those namespaces and publish malicious extensions that appear as trusted recommendations inside the IDEs. While Microsoft’s official Visual Studio Code distribution is not affected, developers using these forks could unknowingly install malicious extensions capable of credential theft or code execution.

Who is affected

Developers and organizations using unofficial VSCode forks that rely on OpenVSX for extension distribution.

Why CISOs should care

Developer tooling represents a high-impact supply-chain attack surface that can expose source code and CI/CD pipelines.

3 practical actions

1. Standardize IDE usage: Require developers to use approved, official IDE distributions only.

2. Control extensions: Enforce allowlists and restrict installation of unverified extensions.

3. Monitor developer endpoints: Detect anomalous extension behavior or outbound connections.