<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Ishaan Agrawal</title>
    <description>The latest articles on DEV Community by Ishaan Agrawal (@ishaan_agrawal).</description>
    <link>https://dev.to/ishaan_agrawal</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3297890%2F624d6ae4-5cf2-4c24-aca2-e9ac4626ebcb.png</url>
      <title>DEV Community: Ishaan Agrawal</title>
      <link>https://dev.to/ishaan_agrawal</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/ishaan_agrawal"/>
    <language>en</language>
    <item>
      <title>Concerning Amounts of Malware in the VS Code Marketplace: What Microsoft’s Own Logs Reveal</title>
      <dc:creator>Ishaan Agrawal</dc:creator>
      <pubDate>Fri, 09 Jan 2026 02:45:18 +0000</pubDate>
      <link>https://dev.to/ishaan_agrawal/vs-codes-unhinged-malware-problem-what-microsofts-own-logs-reveal-5e1p</link>
      <guid>https://dev.to/ishaan_agrawal/vs-codes-unhinged-malware-problem-what-microsofts-own-logs-reveal-5e1p</guid>
      <description>&lt;p&gt;If you are like me, your VS Code setup is a carefully curated collection of themes, linters, and productivity boosters. We trust the Visual Studio Marketplace to be a safe haven for tools that make our lives easier. But if you take a look under the hood at what is actually getting removed from the platform, the picture gets a lot uglier.&lt;/p&gt;

&lt;p&gt;I recently went down a rabbit hole looking at the official list of &lt;a href="https://github.com/microsoft/vsmarketplace/blob/main/RemovedPackages.md" rel="noopener noreferrer"&gt;removed extensions&lt;/a&gt; on GitHub, and it is a wake-up call for anyone who blindly clicks "Install."&lt;/p&gt;

&lt;h3&gt;
  
  
  The "Install First, Ask Questions Later" Problem
&lt;/h3&gt;

&lt;p&gt;The way the Marketplace works is fundamentally based on a reactive model. Microsoft does have automated scans, but a staggering amount of malicious code only gets taken down &lt;strong&gt;after&lt;/strong&gt; it has already been published and downloaded by unsuspecting developers.&lt;/p&gt;

&lt;p&gt;When you look at the logs of removed extensions, you see a constant stream of entries flagged for things like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Credential Theft:&lt;/strong&gt; Extensions designed to scrape your &lt;code&gt;.env&lt;/code&gt; files or SSH keys.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Typosquatting:&lt;/strong&gt; Malicious clones of popular extensions like Prettier or ESLint that hope you won't notice a tiny misspelling in the name.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Remote Access:&lt;/strong&gt; Plugins that open backdoors into your development environment.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Why This Matters to You
&lt;/h3&gt;

&lt;p&gt;As developers, our machines are high-value targets. We have access to production servers, API keys, proprietary source code, and personal data. A single malicious extension has the same permissions as you do. It can read your files, track your keystrokes, and send your data to a remote server without you ever seeing a popup.&lt;/p&gt;

&lt;p&gt;The scary part isn't just that these extensions exist. It is that they are actively making it onto the store, staying there for days or weeks, and only getting purged after the damage might already be done. &lt;/p&gt;

&lt;h3&gt;
  
  
  How to Protect Your Workflow
&lt;/h3&gt;

&lt;p&gt;You don't have to stop using extensions, but you do need to stop treating the Marketplace like a curated app store where everything is vetted. Here is how I have changed my approach:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Check the Publisher:&lt;/strong&gt; Look for the "Verified" checkmark. If a popular tool is being published by a random account with no history, stay away.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Verify the Numbers:&lt;/strong&gt; If an extension claims to be a popular tool but only has 500 downloads while the real one has 5 million, you are looking at a typosquatting attempt.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Audit Your List:&lt;/strong&gt; Every few months, go through your installed extensions. If something hasn't been updated in years, maybe double-check its safety.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Do a Deeper Scan:&lt;/strong&gt; Since we know malicious code can bypass basic store filters, you need a more aggressive way to vet what you are installing. I suggest using a VS Code extension security analyzer. It will perform a deep security assessment by looking for obfuscated code, hidden network connections, and dangerous dependencies that standard checks often miss. That will give you a clear risk report before you let the code touch your machine.&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Final Thoughts
&lt;/h3&gt;

&lt;p&gt;The VS Code Marketplace is an incredible resource, but we have to stop assuming it is inherently safe. The "Removed Packages" list is proof that malware is constantly slipping through the cracks. &lt;/p&gt;

&lt;p&gt;Take five minutes today to look at what you have installed. It is much better to spend a few minutes auditing your setup now than to spend a week dealing with a compromised machine later.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What's your take? Do you check the credentials of every extension you install, or do you just hit install and hope for the best?&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>productivity</category>
      <category>programming</category>
      <category>backend</category>
    </item>
    <item>
      <title>🚨BREAKING: A Self-Propagating Worm Is Hitting VSCode Extensions Right Now— Here’s How to Protect Yourself</title>
      <dc:creator>Ishaan Agrawal</dc:creator>
      <pubDate>Mon, 20 Oct 2025 00:03:45 +0000</pubDate>
      <link>https://dev.to/ishaan_agrawal/urgent-a-self-propagating-worm-is-hitting-vscode-extensions-right-now-heres-how-to-protect-3pdo</link>
      <guid>https://dev.to/ishaan_agrawal/urgent-a-self-propagating-worm-is-hitting-vscode-extensions-right-now-heres-how-to-protect-3pdo</guid>
      <description>&lt;p&gt;Hey everyone, this is a quick but urgent post. A new, highly sophisticated worm is actively targeting developers on both the &lt;strong&gt;VSCode and OpenVSX marketplaces&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;It's called &lt;strong&gt;"Glassworm,"&lt;/strong&gt; and you need to know about it.&lt;/p&gt;

&lt;h3&gt;
  
  
  What is Glassworm?
&lt;/h3&gt;

&lt;p&gt;This isn't your typical malware. According to a &lt;a href="https://www.koi.ai/incident/live-updates-glassworm-first-self-propagating-worm-using-invisible-code-hits-openvsx-and-vscode-marketplaces" rel="noopener noreferrer"&gt;new incident report&lt;/a&gt;, Glassworm is the first self-propagating worm to use &lt;strong&gt;invisible Unicode characters&lt;/strong&gt; to hide its malicious code.&lt;/p&gt;

&lt;p&gt;This means the malicious parts of the code can be completely invisible during a standard code review, making it incredibly stealthy and dangerous.&lt;/p&gt;

&lt;h3&gt;
  
  
  Why This Is So Dangerous
&lt;/h3&gt;

&lt;p&gt;When an infected extension is installed, it's a full-blown disaster. The worm is a Remote Access Trojan (RAT) that immediately gets to work:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Steals Credentials:&lt;/strong&gt; It harvests your NPM, GitHub, and Git credentials.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Spreads Itself:&lt;/strong&gt; It &lt;em&gt;uses&lt;/em&gt; those stolen credentials to infect other packages and extensions you have access to, just like a true worm.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Drains Wallets:&lt;/strong&gt; It actively targets 49 different cryptocurrency wallet extensions.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Hijacks Your Machine:&lt;/strong&gt; It deploys SOCKS proxies (turning your dev box into a criminal proxy) and installs a hidden VNC for full remote access.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To make matters worse, its command-and-control server is reportedly blockchain-based, making it extremely difficult to shut down.&lt;/p&gt;

&lt;h3&gt;
  
  
  How to Protect Yourself RIGHT NOW
&lt;/h3&gt;

&lt;p&gt;We all install extensions—themes, linters, snippets. We trust them. But this incident proves we can't be complacent. The most immediate action you can take is to &lt;strong&gt;scan your extensions&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;A fantastic (and free) tool for this is &lt;strong&gt;&lt;a href="https://vscan.dev/" rel="noopener noreferrer"&gt;vscan.dev&lt;/a&gt;&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;It's a security analyzer built specifically for VS Code extensions. You can paste in the name of an extension, and it will run a deep analysis of its code, permissions, dependencies, and network activity &lt;em&gt;before&lt;/em&gt; you install it. It's designed to catch exactly this kind of suspicious behavior.&lt;/p&gt;

&lt;h3&gt;
  
  
  Your New Security Workflow (Starting Today)
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt; &lt;strong&gt;Audit Your Current Extensions:&lt;/strong&gt; Go to &lt;strong&gt;&lt;a href="https://vscan.dev" rel="noopener noreferrer"&gt;vscan.dev&lt;/a&gt;&lt;/strong&gt; and check the extensions you &lt;em&gt;already have installed&lt;/em&gt;.&lt;/li&gt;
&lt;li&gt; &lt;strong&gt;Scan Before You Install:&lt;/strong&gt; Make this a new habit. Before you click "Install" on any new extension, run it through &lt;code&gt;vscan.dev&lt;/code&gt; first.&lt;/li&gt;
&lt;li&gt; &lt;strong&gt;Review the Report:&lt;/strong&gt; Look for red flags like dangerous API usage, suspicious network connections, or vulnerable dependencies.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This is an active, ongoing threat. Don't assume your editor is safe. Take 10 minutes, scan your tools, and stay vigilant.&lt;/p&gt;

&lt;p&gt;Stay safe out there.&lt;/p&gt;

</description>
      <category>vscode</category>
      <category>security</category>
      <category>software</category>
      <category>programming</category>
    </item>
    <item>
      <title>Are Your VSCode Extensions Safe? The Risk We Don’t Talk About</title>
      <dc:creator>Ishaan Agrawal</dc:creator>
      <pubDate>Mon, 15 Sep 2025 01:58:47 +0000</pubDate>
      <link>https://dev.to/ishaan_agrawal/are-your-vscode-extensions-safe-the-risk-we-dont-talk-about-1lc</link>
      <guid>https://dev.to/ishaan_agrawal/are-your-vscode-extensions-safe-the-risk-we-dont-talk-about-1lc</guid>
      <description>&lt;p&gt;Every developer I know has the same ritual:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Open VSCode.&lt;/li&gt;
&lt;li&gt;Search for an extension that solves the problem at hand.&lt;/li&gt;
&lt;li&gt;Click &lt;em&gt;Install&lt;/em&gt;.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Done. Back to coding.&lt;/p&gt;

&lt;p&gt;It feels harmless — almost routine. But every click gives &lt;em&gt;someone else’s code&lt;/em&gt; permission to run inside your editor. And sometimes, that trust is misplaced.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Quiet Problem with Extensions
&lt;/h2&gt;

&lt;p&gt;VSCode extensions aren’t sandboxed little toys. They can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Read and write files in your workspace.&lt;/li&gt;
&lt;li&gt;Spawn background processes.&lt;/li&gt;
&lt;li&gt;Send data over the network.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And the scary part? Even a “safe-looking” extension can turn risky overnight if the maintainer sells it or if a dependency gets compromised. Supply-chain attacks thrive in exactly these blind spots.&lt;/p&gt;

&lt;p&gt;We’ve already seen examples where extensions with &lt;strong&gt;millions of downloads&lt;/strong&gt; were caught doing shady things: crypto-mining, credential harvesting, injecting ads. Most of them looked legitimate until someone finally dug into the code.&lt;/p&gt;




&lt;h2&gt;
  
  
  Why We Rarely Notice
&lt;/h2&gt;

&lt;p&gt;The VSCode Marketplace gives us stars, reviews, and download counts — but none of that says anything about what’s happening under the hood. A theme extension with ten lines of CSS might still request filesystem access. A linter might quietly collect telemetry.&lt;/p&gt;

&lt;p&gt;And honestly, most of us never read the manifest or source before installing. We just trust the numbers.&lt;/p&gt;




&lt;h2&gt;
  
  
  Tools That Help Us See
&lt;/h2&gt;

&lt;p&gt;That’s why security analyzers for extensions matter. &lt;a href="https://vscan.dev" rel="noopener noreferrer"&gt;&lt;strong&gt;VSCan&lt;/strong&gt;&lt;/a&gt; is one example — it scans VSCode extensions and highlights things developers often miss:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Overly broad permissions.&lt;/li&gt;
&lt;li&gt;Vulnerable or outdated dependencies.&lt;/li&gt;
&lt;li&gt;Privacy or security concerns.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It generates a clear report so you can make an informed decision before hitting &lt;em&gt;Install&lt;/em&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  A Better Habit
&lt;/h2&gt;

&lt;p&gt;We’ve normalized running &lt;code&gt;npm audit&lt;/code&gt; or checking Docker images for CVEs. Why not treat our editor the same way?&lt;/p&gt;

&lt;p&gt;Next time you’re about to install that shiny “Markdown Preview Ultra++” plugin, pause. Ask:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Does it really need the permissions it’s asking for?&lt;/li&gt;
&lt;li&gt;Who maintains it, and how active is the repo?&lt;/li&gt;
&lt;li&gt;Has anyone looked at its dependencies lately?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And if you want a quick head start, running it through a tool like VSCan takes seconds.&lt;/p&gt;




&lt;h2&gt;
  
  
  Closing Thought
&lt;/h2&gt;

&lt;p&gt;The extensions we install aren’t just productivity boosters — they’re part of our attack surface. The sooner we treat them that way, the safer our workflows will be.&lt;/p&gt;

&lt;p&gt;So maybe the next time you hit &lt;em&gt;Install&lt;/em&gt;, don’t just look at the stars. Take a peek under the hood.&lt;/p&gt;

&lt;p&gt;👉 Try scanning your extensions: &lt;a href="https://vscan.dev" rel="noopener noreferrer"&gt;vscan.dev&lt;/a&gt;&lt;/p&gt;

</description>
      <category>vscode</category>
      <category>security</category>
      <category>productivity</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>VSCode Extensions are Malicious—Here's What I Found After Scanning 1,000 of Them</title>
      <dc:creator>Ishaan Agrawal</dc:creator>
      <pubDate>Thu, 26 Jun 2025 20:03:47 +0000</pubDate>
      <link>https://dev.to/ishaan_agrawal/many-vscode-extensions-are-malicious-heres-what-i-found-after-scanning-1000-of-them-5ane</link>
      <guid>https://dev.to/ishaan_agrawal/many-vscode-extensions-are-malicious-heres-what-i-found-after-scanning-1000-of-them-5ane</guid>
      <description>&lt;p&gt;When you're browsing the web, you wouldn't download random files from untrusted sources.&lt;/p&gt;

&lt;p&gt;So why are we so comfortable installing random Visual Studio Code extensions—without knowing what they do under the hood?&lt;/p&gt;

&lt;p&gt;Visual Studio Code extensions run with &lt;strong&gt;full access to your machine&lt;/strong&gt;. That includes your file system, network, terminal, and even your credentials.&lt;/p&gt;

&lt;p&gt;And here's the catch: there's no sandbox, no permissions model, and no built-in validation to stop them from going rogue.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Hidden Risk in Everyday Development
&lt;/h2&gt;

&lt;p&gt;VSCode is the most widely used code editor in the world, with over 14 million developers relying on it monthly and controlling roughly 75% of the code editor market.&lt;/p&gt;

&lt;p&gt;Its powerful extension ecosystem is a key reason for its success. Extensions add support for languages, linters, themes, and advanced features. But they also introduce a serious and largely unaddressed risk: &lt;strong&gt;every extension you install executes with the same system-level privileges as the editor itself&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Extensions can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Read and write files anywhere on your system&lt;/li&gt;
&lt;li&gt;Open unrestricted network connections&lt;/li&gt;
&lt;li&gt;Launch subprocesses&lt;/li&gt;
&lt;li&gt;Modify environment variables and configuration files&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It's essentially the same as running an unvetted Node.js application on your machine, under the assumption that it won't abuse its access.&lt;/p&gt;

&lt;p&gt;I wanted to understand the real extent of this problem...&lt;/p&gt;

&lt;h2&gt;
  
  
  What the Data Says
&lt;/h2&gt;

&lt;p&gt;Using the tool &lt;a href="https://vscan.dev" rel="noopener noreferrer"&gt;&lt;strong&gt;VSCan&lt;/strong&gt;&lt;/a&gt;, I scanned &lt;strong&gt;1,077 popular extensions&lt;/strong&gt; from the VSCode Marketplace.&lt;/p&gt;

&lt;p&gt;Here are the results:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Category&lt;/th&gt;
&lt;th&gt;Count&lt;/th&gt;
&lt;th&gt;Description&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Malicious Functionality&lt;/td&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;Detected by reputed anti-virus engines&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Malicious Network Connections&lt;/td&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;Contacting dangerous IPs&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Vulnerable Dependencies&lt;/td&gt;
&lt;td&gt;33&lt;/td&gt;
&lt;td&gt;Outdated libraries with critical flaws&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Hardcoded Secrets&lt;/td&gt;
&lt;td&gt;39&lt;/td&gt;
&lt;td&gt;Credentials, tokens, and API keys publicly exposed&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Poor Security Hygiene&lt;/td&gt;
&lt;td&gt;204&lt;/td&gt;
&lt;td&gt;Bad permission regulation, no version control, no audits&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;High Permissions Usage&lt;/td&gt;
&lt;td&gt;71&lt;/td&gt;
&lt;td&gt;Activated on all files or using unrestricted access patterns&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;These aren't theoretical risks. In several cases, extensions with &lt;strong&gt;tens of thousands of downloads&lt;/strong&gt; were actively reaching out to suspicious infrastructure, using dangerous APIs, or leaking secrets in plain text.&lt;/p&gt;

&lt;h2&gt;
  
  
  Building VSCan
&lt;/h2&gt;

&lt;p&gt;As a security researcher and developer, I wanted a way to analyze extensions before trusting them. So I built &lt;strong&gt;VSCan&lt;/strong&gt;—a free tool that statically analyzes VSCode, Cursor, and Windsurf extensions for malicious behavior and security risks.&lt;/p&gt;

&lt;p&gt;VSCan inspects every part of an extension's package, looking for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Obfuscated or malicious code&lt;/li&gt;
&lt;li&gt;Dangerous API usage and activation patterns&lt;/li&gt;
&lt;li&gt;Insecure permissions and shell execution&lt;/li&gt;
&lt;li&gt;Known vulnerabilities in bundled dependencies&lt;/li&gt;
&lt;li&gt;Hardcoded secrets like API keys or credentials&lt;/li&gt;
&lt;li&gt;Suspicious network endpoints&lt;/li&gt;
&lt;li&gt;Low-quality development practices flagged by OSSF Scorecard&lt;/li&gt;
&lt;li&gt;High-risk logic, detected through AST and LLM-based code reasoning&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Under the Hood: How VSCan Works
&lt;/h2&gt;

&lt;p&gt;VSCan uses &lt;strong&gt;static analysis&lt;/strong&gt; to inspect everything inside an extension bundle, without executing any code.&lt;/p&gt;

&lt;p&gt;The engine analyzes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;package.json&lt;/code&gt; for activation events, main scripts, and permissions&lt;/li&gt;
&lt;li&gt;JavaScript/TypeScript files using Babel ASTs&lt;/li&gt;
&lt;li&gt;Dependency trees extracted from &lt;code&gt;package-lock.json&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Network calls to external domains&lt;/li&gt;
&lt;li&gt;Command execution via &lt;code&gt;child_process&lt;/code&gt; or dynamic imports&lt;/li&gt;
&lt;li&gt;Secret patterns using entropy + regex-based detection&lt;/li&gt;
&lt;li&gt;OSSF Scorecard data for repo-level security practices&lt;/li&gt;
&lt;li&gt;AI-assisted reasoning to verify hidden or obfuscated intent&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Experimental Runtime Sandboxing
&lt;/h2&gt;

&lt;p&gt;Static analysis has its limits. Some malicious behavior only occurs after installation or under specific runtime conditions.&lt;/p&gt;

&lt;p&gt;That's why I've started building a &lt;strong&gt;custom sandbox layer&lt;/strong&gt; to limit extension capabilities at runtime. It works by intercepting sensitive operations—file access, shell execution, and network activity—and enforcing restrictions on a per-extension basis.&lt;/p&gt;

&lt;p&gt;There is currently &lt;strong&gt;no permission isolation&lt;/strong&gt; in VSCode. This sandbox prototype is an early step toward bridging that gap.&lt;/p&gt;

&lt;h2&gt;
  
  
  Who This Is For
&lt;/h2&gt;

&lt;p&gt;VSCan is designed for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Developers who want to verify third-party extensions&lt;/li&gt;
&lt;li&gt;Security engineers auditing supply chain components&lt;/li&gt;
&lt;li&gt;Teams managing secure development environments&lt;/li&gt;
&lt;li&gt;Extension authors checking for issues before publishing&lt;/li&gt;
&lt;li&gt;Users of VSCode forks like Cursor or Windsurf seeking safer defaults&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Whether you're installing one extension or auditing hundreds, this tool can catch issues you won't spot by just reading the README.&lt;/p&gt;

&lt;h2&gt;
  
  
  Try It
&lt;/h2&gt;

&lt;p&gt;No signup required. Works directly in the browser. Fully open to the community.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Start scanning extensions here:&lt;/strong&gt; &lt;a href="https://vscan.dev" rel="noopener noreferrer"&gt;https://vscan.dev&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;If you're using VSCode and have never looked inside your extensions, it might be time. Because that helpful syntax highlighter or theme switcher might be doing a lot more than just highlighting code.&lt;/p&gt;

</description>
      <category>security</category>
      <category>vscode</category>
      <category>programming</category>
      <category>ai</category>
    </item>
  </channel>
</rss>
