Article Details
Scrape Timestamp (UTC): 2026-01-05 16:44:16.090
Original Article Text
Click to Toggle View
VSCode IDE forks expose users to "recommended extension" attacks. Popular AI-powered integrated development environment solutions, such as Cursor, Windsurf, Google Antigravity, and Trae, recommend extensions that are non-existent in the OpenVSX registry, allowing threat actors to claim the namespace and upload malicious extensions. These AI-assisted IDEs are forked from Microsoft VSCode, but cannot use the extensions in the official store due to licensing restrictions. Instead, they are supported by OpenVSX, an open-source marketplace alternative for VSCode-compatible extensions. As a result of forking, the IDEs inherit the list of officially recommended extensions, hardcoded in the configuration files, which point to Microsoft’s Visual Studio Marketplace. These recommendations come in two forms: one file-based, triggered when opening a file such as azure-pipelines.yaml, and recommends the Azure Pipelines extension; the other is software-based, occurring when detecting that PostgreSQL is installed on the developer’s system and suggesting a PostgreSQL extension. However, not all of the recommended extensions exist on OpenVSX, so the corresponding publisher namespaces are unclaimed. Researchers at supply-chain security company Koi say that a threat actor could take advantage of users' trust in app recommendations and register the unclaimed namespaces to push malware. The researchers reported the issue to Google, Windsurf, and Cursor in late November 2025. Google reacted by removing 13 extension recommendations from its IDE on December 26, but Cursor and Windsurf have not responded yet. Meanwhile, Koi researchers claimed the namespaces of the following extensions to prevent malicious exploitation: The researchers uploaded non-functional placeholder extensions that offer no real functionality but still block a supply-chain attack. Additionally, they have coordinated with Eclipse Foundation, the operator of OpenVSX, to verify the remaining referenced namespaces, remove non-official contributors, and apply broader registry-level safeguards. At this time, there’s no indication that malicious actors have exploited this security gap before Koi researchers' discovery and action. Users of forked IDEs are advised to always verify extension recommendations by manually accessing the OpenVSX registry and checking that they come from a reputable publisher. The 2026 CISO Budget Benchmark It's budget season! Over 300 CISOs and security leaders have shared how they're planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026. Learn how top leaders are turning investment into measurable impact.
Daily Brief Summary
AI-powered IDEs forked from Microsoft VSCode are recommending non-existent extensions, creating a potential attack vector for threat actors to upload malicious content.
Due to licensing restrictions, these IDEs rely on OpenVSX, an open-source marketplace, rather than Microsoft's official extension store.
Researchers identified unclaimed namespaces in OpenVSX, which could be exploited by attackers to distribute malware under trusted extension names.
Google has proactively removed 13 risky extension recommendations from its IDE, while other IDE providers, Cursor and Windsurf, have yet to respond.
Security firm Koi has preemptively claimed vulnerable namespaces and coordinated with OpenVSX to implement registry-level safeguards.
No evidence currently suggests exploitation of this vulnerability prior to the researchers' intervention, but users are advised to verify extension sources independently.
This incident underscores the importance of rigorous supply chain security measures and the need for continuous monitoring of third-party dependencies.