Close Menu
  • Threat Intelligence
    • Cyber Attacks & Exploits
    • Data Breaches
    • Malware Analysis
  • Security Tools
    • Cybersecurity Tool Reviews
    • Cybersecurity Tools
    • Top 10 Security Tools
  • News & Updates
    • Cybersecurity Weekly Report
    • Industry Updates
  • Endpoint & System Security
  • Mobile Security
  • Cyber Insurance
  • Cyber law & Compliance
X (Twitter) LinkedIn WhatsApp
Trending
  • Cybersecurity Weekly Report (April 06–12, 2026): Ransomware & Major Attacks
  • Cybersecurity Weekly Report: March 23 – 29, 2026
  • Data Breach Detection Time 2026: The Full Guide
  • Kali Linux 2026.1: 8 New Hacking Tools & BackTrack Mode
  • Cybersecurity Weekly Report: 16 – 22 March, 2026
  • CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE
  • WhiteHat Hub VBA Macros Workshop 2026 – Learn Macro Malware Analysis
  • Betterleaks Secrets Scanner: Fixing API Key Leak Detection Gaps
Tuesday, April 21
Cyber infos
X (Twitter) LinkedIn WhatsApp
  • Threat Intelligence
    • Cyber Attacks & Exploits
    • Data Breaches
    • Malware Analysis
  • Security Tools
    • Cybersecurity Tool Reviews
    • Cybersecurity Tools
    • Top 10 Security Tools
  • News & Updates
    • Cybersecurity Weekly Report
    • Industry Updates
  • Endpoint & System Security
  • Mobile Security
  • Cyber Insurance
  • Cyber law & Compliance
Cyber infos
Cyber Attacks & Exploits

Over 100 VS Code Extensions Exposed: Major Security Risks Threaten Developers Worldwide

When convenience turns risky how hidden VS Code extension flaws expose the software world
V DiwaharBy V DiwaharOctober 16, 2025Updated:March 24, 2026No Comments8 Mins Read
Facebook Twitter Pinterest LinkedIn WhatsApp Copy Link
Share
Facebook Twitter Pinterest Threads Copy Link

If you use Visual Studio Code every day, this might make you pause for a moment.
Recent research found that more than a hundred popular VS Code extensions accidentally leaked sensitive information — like access tokens — that could let hackers sneak in and spread malicious updates.

This discovery highlights a growing issue with VS Code extension security risks and reminds developers just how fragile the software supply chain can be. Something as small as a forgotten key inside an extension could open the door for serious trouble.

Table of Contents hide
1 How the Discovery Happened
2 Why VS Code Extensions Are Risky Business
3 What the Researchers Found
4 Marketplace Tokens: A Small Leak with Big Consequences
5 When Internal Tools Get Hit Too
6 Simple Ways Developers Can Stay Safe
7 Enter TigerJack: A Threat Actor in Disguise
8 How the Malicious Extensions Worked
9 The Trojan Horse Problem
10 Microsoft’s Defense and What’s Still Missing
11 Lessons About Supply Chain Security
12 Final thoughts

How the Discovery Happened

The team at Wiz Security decided to take a closer look at the extensions uploaded to the VS Code Marketplace. What they found was unsettling — more than 100 extensions contained leaked personal access tokens (PATs).

According to Rami McCarthy, one of Wiz’s researchers, a single leaked token could have given attackers the power to push out malicious updates directly to thousands of developers. In short, one small mistake could have turned into a massive malware distribution event across the VS Code ecosystem.

It’s a classic reminder that even trusted tools can become attack paths when developers accidentally expose sensitive credentials.

Why VS Code Extensions Are Risky Business

We all love extensions — they make VS Code so much more powerful. Whether it’s for debugging, styling, or connecting to APIs, extensions are what make coding smooth.
But here’s the flip side: every extension you install is another piece of code running on your machine, and that means another opportunity for risk.

Most VS Code extensions are shipped as .vsix files, which anyone can unzip and inspect. That means if a developer accidentally leaves API keys or tokens inside, those secrets can easily end up in the wrong hands. Once an attacker finds those keys, they can impersonate the publisher, upload new (malicious) versions, or steal data from users.

That’s why experts keep emphasizing that VS Code extension security risks are not just theoretical—they’re happening right now.

What the Researchers Found

The Wiz team didn’t just find a few stray tokens. They uncovered over 550 valid secrets buried inside more than 500 different extensions, coming from hundreds of publishers.

Those leaked secrets included keys for:

  • AI platforms like OpenAI, Gemini, Anthropic, and Hugging Face
  • Cloud providers such as AWS, Google Cloud, and GitHub
  • Payment and authentication services including Stripe and Auth0
  • Databases like MongoDB, PostgreSQL, and Supabase

Each of these leaks could have been used in harmful ways — from taking over extension accounts to stealing sensitive data. It’s a reminder that one careless commit can put thousands of users at risk.

Marketplace Tokens: A Small Leak with Big Consequences

The report also revealed that more than 100 extensions leaked VS Code Marketplace access tokens, affecting roughly 85,000 installations. Another 30 extensions leaked Open VSX tokens, which represented around 100,000 installs.

If those numbers don’t sound scary enough, consider this: AI-based code editors like Cursor and Windsurf, which rely on Open VSX, are also exposed to these same risks. That means attackers could potentially use those tokens to push fake updates to a much larger audience without any warning.

It’s a chain reaction waiting to happen — and it shows how interconnected the software ecosystem has become.

When Internal Tools Get Hit Too

One of the most shocking discoveries from Wiz involved a $30 billion company that accidentally leaked a token inside one of its internal extensions. If that token had been abused, attackers could have injected malware right into the company’s private developer environment.

Thankfully, Microsoft responded quickly when informed. The company revoked all the exposed tokens and rolled out a secret scanning system to automatically block extensions that contain sensitive information. From now on, developers will get alerts if secrets are detected before an extension goes live.

It’s a solid step forward — but it also shows how fragile even corporate setups can be when VS Code extension security risks are ignored.

Simple Ways Developers Can Stay Safe

Protecting yourself doesn’t mean giving up on extensions altogether — it’s about using them wisely. Here are a few habits every developer should pick up:

1️⃣ Install Less, Trust More

Only use extensions you truly need and from publishers you recognize. Each one you add increases your exposure.

2️⃣ Check Before You Install

If an extension’s source code is public, scan through it. Look for any hard-coded tokens or suspicious code.

3️⃣ Turn Off Auto-Updates

As convenient as auto-updates are, they can install infected versions without you knowing. It’s safer to review updates manually.

4️⃣ Keep an Extension Inventory

Know what’s installed across your team. That way, if a vulnerability is reported, you can act fast.

5️⃣ Create an Internal Allowlist

For companies, having a whitelist of approved extensions is a simple but powerful defense.

These steps may seem small, but they drastically cut down your exposure to VS Code extension security risks.

Over 100 VS Code Extensions Exposed: Major Security Risks Threaten Developers Worldwide
Tiger jack’s git repository (Source:Cyberpress)

Enter TigerJack: A Threat Actor in Disguise

While Wiz uncovered accidental leaks, another story was unfolding. A cybercriminal group named TigerJack was caught publishing fake but functional VS Code extensions that secretly carried malware.

Researchers at Koi Security discovered at least 11 of these extensions floating around the VS Code Marketplace. They looked totally harmless — clean descriptions, proper functionality, and no obvious red flags. But behind the scenes, they were stealing code, mining crypto, and even creating backdoors for remote control.

It’s the perfect trap: something that seems helpful but hides something far more dangerous.

How the Malicious Extensions Worked

Two of TigerJack’s extensions — C++ Playground and HTTP Format — had already been downloaded over 17,000 times before being taken down.

The first one logged keystrokes and sent copies of your source code to an attacker’s server. The second quietly ran the CoinIMP crypto miner, draining CPU power in the background.

Even worse, some of their other extensions connected to remote servers every 20 minutes to download new malicious instructions. That means they could install ransomware, steal credentials, or spy on activity without ever updating through the marketplace.

It’s sneaky, smart, and terrifying — and a perfect example of why you can’t blindly trust every shiny new plugin.

The Trojan Horse Problem

The scariest part? Most of TigerJack’s extensions started out totally legitimate. They were genuinely helpful tools that earned good reviews and user trust. Then, after a few weeks, the attackers quietly pushed out a “routine” update that injected malicious code.

It’s the digital equivalent of a Trojan horse — harmless at first, but devastating once inside.
Even cautious developers who checked the code before installation could get hit later on.

Microsoft’s Defense and What’s Still Missing

To tackle these threats, Microsoft says it runs every new extension through a multi-step review process. It scans for malware, tests runtime behavior in a sandbox, and performs periodic rechecks of existing extensions.

That’s reassuring — but here’s the catch: these protections only apply to the VS Code Marketplace. Platforms like Open VSX, where many third-party editors pull their extensions from, don’t have the same safeguards.

That means even if a malicious extension gets kicked off Microsoft’s marketplace, attackers can reupload it elsewhere and keep spreading it. Until there’s a unified security approach, this cat-and-mouse game will continue.

Lessons About Supply Chain Security

The lesson here goes far beyond VS Code. It’s about how deeply we’ve come to depend on external code — libraries, APIs, plugins — and how every one of them can become a weak link if left unchecked.

Organizations can protect themselves by:

  • Using code signing for internal extensions
  • Running automated secret scanning
  • Enforcing zero-trust policies for developer tools
  • Training developers to spot red flags before installing

In the end, protecting the software supply chain isn’t just about technology — it’s about awareness and discipline.

Final thoughts

The exposure of secrets in over a hundred VS Code extensions is a loud wake-up call. It shows that even tools built to make developers’ lives easier can turn against them if security isn’t handled properly.

VS Code extension security risks will always exist to some degree, but with smart habits and better checks, developers can stay ahead of attackers. It’s not about fear — it’s about being alert. The next time you click “Install Extension,” take a moment to think: Do I really trust this code?

Because in today’s connected world, a little caution goes a long way.

Related posts:

  1. Is Your Security Enough? Top 5 Underestimated Cyber Threats on the Rise
  2. How Big Data is Driving New Cybersecurity Measures
  3. Inside the ICC Cyber Attack: How Hackers Targeted Global Justice in 2025
  4. SmarterMail Vulnerabilities Actively Exploited in Ransomware Attacks
Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticleNew WhatsApp Worm Banking Malware Spreads Through Chats
Next Article Capita Data Breach: £14 Million Fine Exposes 6.6 Million Users’ Personal Information
V Diwahar
  • Website
  • LinkedIn

I'm Aspiring SOC Analyst and independent Cybersecurity researcher, founder of CyberInfos.in. I analyzes cyber threats, vulnerabilities, and attacks, providing practical security insights for organizations and cybersecurity professionals worldwide.

Related Posts

CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE

March 20, 2026
Read More

Iran Cyber Attacks 2026: Hacktivist Surge Hits 110 Targets

March 5, 2026
Read More

Perplexity Comet Browser Vulnerability Exploited via Calendar Invite

March 4, 2026
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber Attacks & Exploits

CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE

March 20, 2026

Iran Cyber Attacks 2026: Hacktivist Surge Hits 110 Targets

March 5, 2026

Perplexity Comet Browser Vulnerability Exploited via Calendar Invite

March 4, 2026

AI-Powered Cyber Attacks Surge 89% in 2025 Crisis Breakouts

February 25, 2026

Google Antigravity Suspension Hits OpenClaw Users

February 24, 2026
Top 10 Security Tools

Top 10 Best Autonomous Endpoint Management Tools in 2026

November 14, 2025

Top 10 Best API Security Testing Tools in 2026

October 29, 2025

10 Best Free Malware Analysis Tools–2026

July 1, 2025

Top 10 Best Dynamic Malware Analysis Tools in 2026

March 6, 2025

Mobile Security

Android Security Update Fixes 129 Flaws, Zero-Day

March 3, 2026

PromptSpy Android Malware Marks First Use of Generative AI in Mobile Attacks

February 20, 2026

Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions

December 19, 2025

How to Prevent SIM Swap Attacks and Protect Your Mobile Number in 2026

December 16, 2025

How to Use a VPN to Protect Your Privacy in 2026 (Step-by-Step Guide)

December 13, 2025
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2026

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2026

November 26, 2025
Recents

Cybersecurity Weekly Report (April 06–12, 2026): Ransomware & Major Attacks

April 13, 2026

Cybersecurity Weekly Report: March 23 – 29, 2026

March 30, 2026

Data Breach Detection Time 2026: The Full Guide

March 28, 2026

Kali Linux 2026.1: 8 New Hacking Tools & BackTrack Mode

March 26, 2026

Cybersecurity Weekly Report: 16 – 22 March, 2026

March 22, 2026
Pages
  • About us
  • Contact us
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

CyberInfos delivers trusted cybersecurity news, expert threat analysis, and digital safety guidance for individuals and businesses worldwide.

LinkedIn
Partners
White Hat Hub Partner
X (Twitter) LinkedIn WhatsApp
  • Contact us
  • Sitemap
Copyright © 2026 cyberinfos.in - All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.