Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

VS Code Forks Recommend Missing Extensions, Creating Supply Chain Risk in Open VSX

0
Medium
Vulnerability
Published: Tue Jan 06 2026 (01/06/2026, 11:25:00 UTC)
Source: The Hacker News

Description

Popular artificial intelligence (AI)-powered Microsoft Visual Studio Code (VS Code) forks such as Cursor, Windsurf, Google Antigravity, and Trae have been found to recommend extensions that are non-existent in the Open VSX registry, potentially opening the door to supply chain risks when bad actors publish malicious packages under those names. The problem, according to Koi, is that these

AI-Powered Analysis

AILast updated: 01/06/2026, 14:38:23 UTC

Technical Analysis

The threat involves AI-powered forks of Microsoft Visual Studio Code (VS Code) — specifically Cursor, Windsurf, Google Antigravity, and Trae — which recommend extensions that are officially listed in Microsoft's extension marketplace but are absent from the Open VSX registry, an alternative open-source extension repository. These forks inherit extension recommendations from Microsoft's marketplace, but since the recommended extensions do not exist in Open VSX, their namespaces remain unclaimed. This creates a supply chain vulnerability where malicious actors can register these missing extension names in Open VSX and upload malicious packages. When developers using these forks see recommendations for such extensions (e.g., PostgreSQL extension ms-ossdata.vscode-postgresql) and install them, they inadvertently deploy potentially harmful code. This code can exfiltrate sensitive information such as credentials, secrets, and source code, compromising confidentiality and integrity. Koi security researchers demonstrated this risk by registering placeholder malicious extensions, which quickly attracted hundreds of installs, indicating developers' trust in IDE recommendations. The problem stems from a disconnect between Microsoft's official extension marketplace and Open VSX, combined with the forks' reliance on the former's recommendations without verifying availability in the latter. In response, affected forks have released fixes to prevent recommending non-existent extensions, and the Eclipse Foundation has removed non-official contributors and implemented registry-level safeguards in Open VSX. Despite these measures, the risk highlights the broader challenge of supply chain security in open-source ecosystems and the need for developers to verify extension authenticity before installation.

Potential Impact

For European organizations, this threat poses a significant supply chain risk, especially for software development teams relying on AI-powered VS Code forks that integrate Open VSX for extensions. The installation of malicious extensions can lead to unauthorized access to sensitive corporate data, including source code, credentials, and secrets, potentially resulting in intellectual property theft, data breaches, and compliance violations under regulations like GDPR. The stealthy nature of this attack—leveraging trusted IDE recommendations—can bypass traditional security controls and evade detection. Organizations with development environments that incorporate these forks or use Open VSX extensions are particularly vulnerable. The impact extends beyond individual developers to the broader software supply chain, potentially affecting downstream applications and services. Additionally, the risk of credential theft can facilitate lateral movement within corporate networks, escalating the severity of breaches. The medium severity rating reflects the ease of exploitation (simple install action), the potential for significant data compromise, and the widespread use of VS Code forks in development workflows.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Enforce strict policies to restrict installation of VS Code extensions to those sourced only from verified and official registries, preferably Microsoft's official marketplace rather than Open VSX, unless the latter is fully vetted. 2) Educate developers about the risks of blindly trusting IDE extension recommendations, emphasizing manual verification of publisher authenticity and extension existence in the intended registry before installation. 3) Employ endpoint security solutions capable of monitoring and alerting on suspicious extension installations or unusual IDE behaviors indicative of malicious activity. 4) Integrate software composition analysis (SCA) tools into development pipelines to scan installed extensions for known vulnerabilities or malicious indicators. 5) Collaborate with IDE vendors and open-source registry maintainers to ensure synchronization of extension listings and timely patching of recommendation mechanisms. 6) Regularly audit development environments for unauthorized or suspicious extensions and remove them promptly. 7) Consider network-level controls to restrict access to untrusted extension registries or repositories. 8) Encourage use of signed extensions and verify digital signatures where supported to ensure integrity and authenticity.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/01/vs-code-forks-recommend-missing.html","fetched":true,"fetchedAt":"2026-01-06T14:37:19.616Z","wordCount":967}

Threat ID: 695d1e21769e869ac5f7ef48

Added to database: 1/6/2026, 2:37:21 PM

Last enriched: 1/6/2026, 2:38:23 PM

Last updated: 1/8/2026, 1:21:33 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats