top | item 44569885

(no title)

riv991 | 7 months ago

Microsoft were very quick to highlight their extensions being safer after this.

https://x.com/code/status/1943720372307665033?s=46

discuss

order

worble|7 months ago

And yet, this entire class of abuse is only possible because Microsoft refuse to implement any kind of permission management or sandboxing for extensions.

https://github.com/microsoft/vscode/issues/52116

rs186|7 months ago

Second this.

As a vscode extension author, I am scared by the power I have. I am not at all surprised by what happened in this story.

jowea|7 months ago

2 seconds? That wasn't the team then, it must have failed some automated filter.

nkrisc|7 months ago

If the team put those filters in place, then it was the team. Anyone implementing automation gets to be held responsible for its failure, but also its successes.

bootsmann|7 months ago

Yeah it had a copy-paste description from the original extension, probably very easy thing to detect

the_mitsuhiko|7 months ago

Unfortunately the marketplace ecosystem is why I went back to VSCode from Cursor. I'm a bit upset by this because I don't quite appreciate that Microsoft has a closed ecosystem for the marketplace and does not open it to Cursor but the reality is, that Open VSX does not have all extensions and little vetting.

delusional|7 months ago

People better remember that tweet the next time somebody finds another malicious extension on their marketplace.

IshKebab|7 months ago

Well this was an extremely unsophisticated attack. The malware wasn't hidden and they didn't even bother to actually copy the real extension.

If I were doing this I would copy the real extension, give it a name that made it sound official but in the README say it is a tweaked version with some improvements or whatever. Also actually add some improvements, but hide the malware in those changes.

Good luck finding that. (brb going to try this)

raincole|7 months ago

The whole thing worked only because they gamed open-vsx ranking algorithm.