VS Code Forks Recommend Missing Extensions, Creating Supply Chain Risk in Open VSX
Popular artificial intelligence (AI)-powered Microsoft Visual Studio Code (VS Code) forks such as Cursor, Windsurf, Google Antigravity, and Trae have been found to recommend extensions that are non-existent in the Open VSX registry, potentially opening the door to supply chain risks when bad actors publish malicious packages under those names. The problem, according to Koi, is that these
AI Analysis
Technical Summary
The threat involves AI-powered forks of Microsoft Visual Studio Code (VS Code) — specifically Cursor, Windsurf, Google Antigravity, and Trae — which recommend extensions that are officially listed in Microsoft's extension marketplace but are absent from the Open VSX registry, an alternative open-source extension repository. These forks inherit extension recommendations from Microsoft's marketplace, but since the recommended extensions do not exist in Open VSX, their namespaces remain unclaimed. This creates a supply chain vulnerability where malicious actors can register these missing extension names in Open VSX and upload malicious packages. When developers using these forks see recommendations for such extensions (e.g., PostgreSQL extension ms-ossdata.vscode-postgresql) and install them, they inadvertently deploy potentially harmful code. This code can exfiltrate sensitive information such as credentials, secrets, and source code, compromising confidentiality and integrity. Koi security researchers demonstrated this risk by registering placeholder malicious extensions, which quickly attracted hundreds of installs, indicating developers' trust in IDE recommendations. The problem stems from a disconnect between Microsoft's official extension marketplace and Open VSX, combined with the forks' reliance on the former's recommendations without verifying availability in the latter. In response, affected forks have released fixes to prevent recommending non-existent extensions, and the Eclipse Foundation has removed non-official contributors and implemented registry-level safeguards in Open VSX. Despite these measures, the risk highlights the broader challenge of supply chain security in open-source ecosystems and the need for developers to verify extension authenticity before installation.
Potential Impact
For European organizations, this threat poses a significant supply chain risk, especially for software development teams relying on AI-powered VS Code forks that integrate Open VSX for extensions. The installation of malicious extensions can lead to unauthorized access to sensitive corporate data, including source code, credentials, and secrets, potentially resulting in intellectual property theft, data breaches, and compliance violations under regulations like GDPR. The stealthy nature of this attack—leveraging trusted IDE recommendations—can bypass traditional security controls and evade detection. Organizations with development environments that incorporate these forks or use Open VSX extensions are particularly vulnerable. The impact extends beyond individual developers to the broader software supply chain, potentially affecting downstream applications and services. Additionally, the risk of credential theft can facilitate lateral movement within corporate networks, escalating the severity of breaches. The medium severity rating reflects the ease of exploitation (simple install action), the potential for significant data compromise, and the widespread use of VS Code forks in development workflows.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Enforce strict policies to restrict installation of VS Code extensions to those sourced only from verified and official registries, preferably Microsoft's official marketplace rather than Open VSX, unless the latter is fully vetted. 2) Educate developers about the risks of blindly trusting IDE extension recommendations, emphasizing manual verification of publisher authenticity and extension existence in the intended registry before installation. 3) Employ endpoint security solutions capable of monitoring and alerting on suspicious extension installations or unusual IDE behaviors indicative of malicious activity. 4) Integrate software composition analysis (SCA) tools into development pipelines to scan installed extensions for known vulnerabilities or malicious indicators. 5) Collaborate with IDE vendors and open-source registry maintainers to ensure synchronization of extension listings and timely patching of recommendation mechanisms. 6) Regularly audit development environments for unauthorized or suspicious extensions and remove them promptly. 7) Consider network-level controls to restrict access to untrusted extension registries or repositories. 8) Encourage use of signed extensions and verify digital signatures where supported to ensure integrity and authenticity.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain, Poland
VS Code Forks Recommend Missing Extensions, Creating Supply Chain Risk in Open VSX
Description
Popular artificial intelligence (AI)-powered Microsoft Visual Studio Code (VS Code) forks such as Cursor, Windsurf, Google Antigravity, and Trae have been found to recommend extensions that are non-existent in the Open VSX registry, potentially opening the door to supply chain risks when bad actors publish malicious packages under those names. The problem, according to Koi, is that these
AI-Powered Analysis
Technical Analysis
The threat involves AI-powered forks of Microsoft Visual Studio Code (VS Code) — specifically Cursor, Windsurf, Google Antigravity, and Trae — which recommend extensions that are officially listed in Microsoft's extension marketplace but are absent from the Open VSX registry, an alternative open-source extension repository. These forks inherit extension recommendations from Microsoft's marketplace, but since the recommended extensions do not exist in Open VSX, their namespaces remain unclaimed. This creates a supply chain vulnerability where malicious actors can register these missing extension names in Open VSX and upload malicious packages. When developers using these forks see recommendations for such extensions (e.g., PostgreSQL extension ms-ossdata.vscode-postgresql) and install them, they inadvertently deploy potentially harmful code. This code can exfiltrate sensitive information such as credentials, secrets, and source code, compromising confidentiality and integrity. Koi security researchers demonstrated this risk by registering placeholder malicious extensions, which quickly attracted hundreds of installs, indicating developers' trust in IDE recommendations. The problem stems from a disconnect between Microsoft's official extension marketplace and Open VSX, combined with the forks' reliance on the former's recommendations without verifying availability in the latter. In response, affected forks have released fixes to prevent recommending non-existent extensions, and the Eclipse Foundation has removed non-official contributors and implemented registry-level safeguards in Open VSX. Despite these measures, the risk highlights the broader challenge of supply chain security in open-source ecosystems and the need for developers to verify extension authenticity before installation.
Potential Impact
For European organizations, this threat poses a significant supply chain risk, especially for software development teams relying on AI-powered VS Code forks that integrate Open VSX for extensions. The installation of malicious extensions can lead to unauthorized access to sensitive corporate data, including source code, credentials, and secrets, potentially resulting in intellectual property theft, data breaches, and compliance violations under regulations like GDPR. The stealthy nature of this attack—leveraging trusted IDE recommendations—can bypass traditional security controls and evade detection. Organizations with development environments that incorporate these forks or use Open VSX extensions are particularly vulnerable. The impact extends beyond individual developers to the broader software supply chain, potentially affecting downstream applications and services. Additionally, the risk of credential theft can facilitate lateral movement within corporate networks, escalating the severity of breaches. The medium severity rating reflects the ease of exploitation (simple install action), the potential for significant data compromise, and the widespread use of VS Code forks in development workflows.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Enforce strict policies to restrict installation of VS Code extensions to those sourced only from verified and official registries, preferably Microsoft's official marketplace rather than Open VSX, unless the latter is fully vetted. 2) Educate developers about the risks of blindly trusting IDE extension recommendations, emphasizing manual verification of publisher authenticity and extension existence in the intended registry before installation. 3) Employ endpoint security solutions capable of monitoring and alerting on suspicious extension installations or unusual IDE behaviors indicative of malicious activity. 4) Integrate software composition analysis (SCA) tools into development pipelines to scan installed extensions for known vulnerabilities or malicious indicators. 5) Collaborate with IDE vendors and open-source registry maintainers to ensure synchronization of extension listings and timely patching of recommendation mechanisms. 6) Regularly audit development environments for unauthorized or suspicious extensions and remove them promptly. 7) Consider network-level controls to restrict access to untrusted extension registries or repositories. 8) Encourage use of signed extensions and verify digital signatures where supported to ensure integrity and authenticity.
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/01/vs-code-forks-recommend-missing.html","fetched":true,"fetchedAt":"2026-01-06T14:37:19.616Z","wordCount":967}
Threat ID: 695d1e21769e869ac5f7ef48
Added to database: 1/6/2026, 2:37:21 PM
Last enriched: 1/6/2026, 2:38:23 PM
Last updated: 1/8/2026, 1:21:33 PM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-1574: CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') in Mitsubishi Electric Iconics Digital Solutions GENESIS64
MediumCVE-2024-1573: CWE-306 Missing Authentication for Critical Function in Mitsubishi Electric Iconics Digital Solutions GENESIS64
MediumThe State of Trusted Open Source
MediumCVE-2026-21874: CWE-772: Missing Release of Resource after Effective Lifetime in zauberzeug nicegui
MediumCVE-2026-21872: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.