• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

VS Code Forks Recommend Missing Extensions, Creating Supply Chain Risk in Open VSX

You are here: Home / General Cyber Security News / VS Code Forks Recommend Missing Extensions, Creating Supply Chain Risk in Open VSX
January 6, 2026

Popular artificial intelligence (AI)-powered Microsoft Visual Studio Code (VS Code) forks such as Cursor, Windsurf, Google Antigravity, and Trae have been found to recommend extensions that are non-existent in the Open VSX registry, potentially opening the door to supply chain risks when bad actors publish malicious packages under those names.

The problem, according to Koi, is that these integrated development environments (IDEs) inherit the list of officially recommended extensions from Microsoft’s extensions marketplace. These extensions don’t exist in Open VSX.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The VS Code extension recommendations can take two different forms: file-based, which are displayed as toast notifications when users open a file in specific formats, or software-based, which are suggested when certain programs are already installed on the host.

“The problem: these recommended extensions didn’t exist on Open VSX,” Koi security researcher Oren Yomtov said. “The namespaces were unclaimed. Anyone could register them and upload whatever they wanted.”

Cybersecurity

In other words, an attacker could weaponize the absence of these VS Code extensions and the fact that the AI-powered IDEs are VS Code forks to upload a malicious extension to the Open VSX registry, such as ms-ossdata.vscode-postgresql.

As a result, any time a developer with PostgreSQL installed opens one of the aforementioned IDEs and sees the message “Recommended: PostgreSQL extension,” a trivial install action is enough to result in the deployment of the rogue extension on their system instead.

This simple act of trust can have severe consequences, potentially leading to the theft of sensitive data, including credentials, secrets, and source code. Koi said its placeholder PostgreSQL extension attracted no less than 500 installs, indicating that developers are downloading it simply because the IDE suggested it as a recommendation.

The names of some of the extensions that have been claimed by Koi with a placeholder are listed below –

  • ms-ossdata.vscode-postgresql
  • ms-azure-devops.azure-pipelines
  • msazurermtools.azurerm-vscode-tools
  • usqlextpublisher.usql-vscode-ext
  • cake-build.cake-vscode
  • pkosta2005.heroku-command

Cybersecurity

In response to responsible disclosure, Cursor and Google have rolled out fixes to address the issue. The Eclipse Foundation, which oversees Open VSX, has since removed non-official contributors and enforced broader registry-level safeguards.

With threat actors increasingly focusing on exploiting the security gaps in extension marketplaces and open-source repositories, it’s essential that developers exercise caution prior to downloading any packages or approving installs by verifying they come from a trusted publisher.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «new n8n vulnerability (9.9 cvss) lets authenticated users execute system New n8n Vulnerability (9.9 CVSS) Lets Authenticated Users Execute System Commands
Next Post: What is Identity Dark Matter? what is identity dark matter?»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • What is Identity Dark Matter?
  • VS Code Forks Recommend Missing Extensions, Creating Supply Chain Risk in Open VSX
  • New n8n Vulnerability (9.9 CVSS) Lets Authenticated Users Execute System Commands
  • Critical AdonisJS Bodyparser Flaw (CVSS 9.2) Enables Arbitrary File Write on Servers
  • Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government
  • Kimwolf Android Botnet Infects Over 2 Million Devices via Exposed ADB and Proxy Networks
  • ⚡ Weekly Recap: IoT Exploits, Wallet Breaches, Rogue Extensions, AI Abuse & More
  • The State of Cybersecurity in 2025: Key Segments, Insights, and Innovations 
  • Bitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act
  • New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code

Copyright © TheCyberSecurity.News, All Rights Reserved.