Wednesday, January 14, 2026

VSCode IDE forks expose customers to “really helpful extension” assaults


Standard AI-powered built-in growth surroundings options, corresponding to Cursor, Windsurf, Google Antigravity, and Trae, suggest extensions which might be non-existent within the OpenVSX registry, permitting menace actors to say the namespace and add malicious extensions.

These AI-assisted IDEs are forked from Microsoft VSCode, however can not use the extensions within the official retailer as a result of licensing restrictions. As an alternative, they’re supported by OpenVSX, an open-source market various for VSCode-compatible extensions.

Because of forking, the IDEs inherit the listing of formally really helpful extensions, hardcoded within the configuration recordsdata, which level to Microsoft’s Visible Studio Market.

Wiz

These suggestions are available two kinds: one file-based, triggered when opening a file corresponding to azure-pipelines.yaml, and recommends the Azure Pipelines extension; the opposite is software-based, occurring when detecting that PostgreSQL is put in on the developer’s system and suggesting a PostgreSQL extension.

Cursor IDE recommends extension non-existent in OpenVSX
Cursor IDE recommends extension not current in OpenVSX
supply: Koi

Nonetheless, not all the really helpful extensions exist on OpenVSX, so the corresponding writer namespaces are unclaimed.

Researchers at supply-chain safety firm Koi say {that a} menace actor may make the most of customers’ belief in app suggestions and register the unclaimed namespaces to push malware.

Diagram
Supply: Koi Safety

The researchers reported the problem to Google, Windsurf, and Cursor in late November 2025. Google reacted by eradicating 13 extension suggestions from its IDE on December 26, however Cursor and Windsurf haven’t responded but.

In the meantime, Koi researchers claimed the namespaces of the next extensions to forestall malicious exploitation:

  • ms-ossdata.vscode-postgresql
  • ms-azure-devops.azure-pipelines
  • msazurermtools.azurerm-vscode-tools
  • usqlextpublisher.usql-vscode-ext
  • cake-build.cake-vscode
  • pkosta2005.heroku-command

The researchers uploaded non-functional placeholder extensions that supply no actual performance however nonetheless block a supply-chain assault.

Moreover, they’ve coordinated with Eclipse Basis, the operator of OpenVSX, to confirm the remaining referenced namespaces, take away non-official contributors, and apply broader registry-level safeguards.

Right now, there’s no indication that malicious actors have exploited this safety hole earlier than Koi researchers’ discovery and motion.

Customers of forked IDEs are suggested to at all times confirm extension suggestions by manually accessing the OpenVSX registry and checking that they arrive from a good writer.

As MCP (Mannequin Context Protocol) turns into the usual for connecting LLMs to instruments and information, safety groups are transferring quick to maintain these new companies protected.

This free cheat sheet outlines 7 greatest practices you can begin utilizing at the moment.

Related Articles

Latest Articles