AI VS Code forks push fake extensions, supply chain risk now

AI-powered VS Code forks recommended extensions missing from Open VSX, allowing attackers to claim unregistered namespaces and publish malicious packages that could expose secrets—vendors and the Eclipse Foundation have since implemented fixes and registry safeguards.

  • Several AI-powered forks of Microsoft Visual Studio Code (VS Code) recommended extensions that were not present in the Open VSX registry.
  • Unclaimed namespaces allowed anyone to register those extension names and upload packages, creating a supply-chain risk.
  • Attackers could publish malicious extensions that users install after seeing IDE recommendations, potentially exposing secrets and source code.
  • Vendors and the Eclipse Foundation implemented fixes and registry safeguards after responsible disclosure.

On Jan. 6, 2026, security researchers reported that AI-powered forks of Microsoft Visual Studio Code (VS Code) — including Cursor, Windsurf, Google Antigravity, and Trae — offered extension recommendations that did not exist in the Open VSX registry, creating a potential supply-chain risk, according to Malware“>Koi.

- Advertisement -

These IDEs inherit recommended extension lists from Microsoft’s marketplace. Recommendations appear in two ways: file-based prompts when opening certain file types, and software-based prompts when specific programs are installed on the host system.

Researcher Oren Yomtov described the core issue: “The problem: these recommended extensions didn’t exist on Open VSX.” Because the namespaces were unclaimed, anyone could register them and upload arbitrary packages to the registry.

As an example, an attacker could publish a package named ms-ossdata.vscode-postgresql. When a developer with PostgreSQL installed opens one of the affected IDEs, they might see “Recommended: PostgreSQL extension” and install the suggested package, which could execute malicious code and expose credentials, secrets, or source code.

Koi published placeholder packages to demonstrate the risk and reported that the PostgreSQL placeholder attracted about 500 installs. Other extension names claimed by Koi as placeholders included ms-azure-devops.azure-pipelines, msazurermtools.azurerm-vscode-tools, usqlextpublisher.usql-vscode-ext, cake-build.cake-vscode, and pkosta2005.heroku-command.

- Advertisement -

Following responsible disclosure, Cursor, Windsurf, and Google released fixes. The Eclipse Foundation removed non-official contributors from the registry and enforced broader safeguards. Developers are advised to verify publisher identities before installing recommended extensions.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Hong Kong CEO Touts City as Web3 Hub, Stablecoin Licenses Soon

Hong Kong's Chief Executive, John KC Lee, has declared the city's goal to become...

Ray Dalio Warns of Government Control via CBDCs

Ray Dalio warns CBDCs grant governments sweeping transaction monitoring and policy enforcement powers.He argues...

LSEG, Apex Group to tokenize private funds by 2026

First paragraph: A compelling hook combining who, what, when, where.LSEG and Apex Group launch...

Justin Sun’s Ex Says X Account Suspended Over Mass Reports

An X account belonging to Justin Sun's alleged former girlfriend, Zeng Ying, was suspended...

Dollar Could Fall 10% on Aggressive Fed Cuts

State Street strategists warn the US dollar could fall up to 10% if the...

Must Read

The Ultimate Guide on How to Understand a Cryptocurrency White Paper

Today, cryptocurrency is a popular buzzword. We hear about it on the news, we read about it on the Internet. Yet, people are reluctant to...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!