Is "updater" on VS Code Marketplace Safe to Install?

Arshdeep · vscode · v0.0.7

update your vs code by developer's choice extension

Risk Assessment

Pending
0
out of 100
MINIMAL

0 security findings detected across all analyzers

VS Code extension analyzed via package manifest and static code analysis

No Threats Detected

This extension passed all security checks

About This Extension

update your vs code by developer's choice extension

No Findings

All security checks passed

AI Security Report

AI Security Analysis: updater

Analysis generated: 2025-12-11T23:00:40+13:00
Model: gemini-3-pro-preview


Quick Facts

Property Value
UUID 0284f2cf-066f-5670-a4e1-cf9a0fa2d78b
Type vscode
Version 0.0.7
Users 41
Risk Score 100.0/100 (CRITICAL)
Malware Detected ⚠️ Yes
Secrets Exposed ✅ No
Critical Vulns ✅ No

AI Analysis

Executive Summary

The extension "updater" (Version 0.0.7) presents a CRITICAL security threat and should be considered malicious. It employs social engineering tactics by masquerading as a legitimate system update tool. The analysis detects aggressive behaviors consistent with malware, including unauthorized file manipulation, network communication, and attempts to establish persistence on the host system immediately upon installation. Do not install this extension. If installed, remove it immediately and initiate incident response procedures.

Threat Assessment

The extension exhibits the characteristics of a "Trojan Horse" or a "Dropper."

  • Social Engineering: The name "updater" and the description "update your vs code by developer's choice" are designed to trick users into believing this is a necessary maintenance tool. VS Code handles its own updates; no extension is required for this function.
  • Malicious Behavior (Post-Install Scripts): The vast majority of high-severity findings relate to postinstall events. In the Node.js/VS Code ecosystem, postinstall scripts execute automatically as soon as the extension is installed, requiring no further user interaction.
  • Attack Chain Indicators: The findings suggest a specific attack chain:
    1. Execution: postinstall_system_command indicates arbitrary code execution.
    2. Payload Delivery: postinstall_file_download suggests it fetches a secondary payload from an external server.
    3. Entrenchment: postinstall_persistence_mechanism indicates it attempts to modify system settings (like Registry keys or Cron jobs) to survive system reboots.
    4. Evasion: postinstall_obfuscation suggests the code is intentionally hidden to bypass static analysis.

Risk Justification

The Risk Score of 100/100 is fully justified and accurate.

  • Malicious Intent: The combination of a deceptive name ("updater") and an unverified publisher ("Arshdeep") is a primary indicator of bad intent.
  • Severity of Capabilities: The extension triggers YARA rules for persistence, obfuscation, and system command execution. These are not behaviors found in legitimate developer tools.
  • Anomalous Volume: The total of 30,840 findings is highly abnormal for a VS Code extension. This suggests the extension may contain a large, obfuscated malicious binary or a compromised dependency tree that is triggering mass alerts.
  • Zero Trust: The Trust Score of 0.0 reflects the lack of publisher verification and community reputation (only 41 users).

Key Findings

  • Persistence Mechanisms (postinstall_persistence_mechanism)
    • Significance: This is the most critical technical finding. It indicates the extension attempts to modify the host OS to ensure the malicious code runs every time the computer starts, turning a temporary extension install into a long-term compromise.
  • System Command Execution (postinstall_system_command)
    • Significance: The extension is executing shell commands directly on the host OS. Combined with the "updater" guise, this likely mimics a system update process while performing malicious actions.
  • Obfuscated Code (postinstall_obfuscation)
    • Significance: Legitimate open-source extensions rarely use heavy obfuscation. This is used almost exclusively to hide malicious logic from scanners and analysts.
  • Network & Download Activity (postinstall_network_communication, postinstall_file_download)
    • Significance: The extension initiates network connections immediately upon install, likely to report to a Command & Control (C2) server or download a second-stage payload (ransomware, stealer, etc.).

Recommendations

  1. Immediate Removal: Uninstall the extension immediately from all affected environments.
  2. Blocklist Implementation: Add the Extension UUID (0284f2cf-066f-5670-a4e1-cf9a0fa2d78b) to the organization's VS Code extension blocklist to prevent future installation.
  3. Incident Response: For the 41 users who installed this:
    • Isolate the affected machines from the network.
    • Scan for persistence mechanisms (e.g., check Windows Task Scheduler, Registry Run keys, or Linux Cron jobs).
    • Reset credentials, as the extension may have scraped environment variables or secrets.
  4. Network Blocking: Investigate the 123 network findings (not detailed in the summary but present in the overview) to identify and block the C2 domains/IPs at the firewall level.

Mitigation Strategies

There is no safe way to use this extension.

Unlike legitimate extensions with vulnerabilities that can be patched or mitigated, this extension appears to be inherently malicious by design.

  • Strict Prohibition: The only mitigation is to ensure it is never installed.
  • Sandbox Analysis (Research Only): If analysis is required, it must be performed in a disposable, air-gapped sandbox environment with no access to production networks or credentials.

Confidence Assessment

Confidence Level: High (95%)

While the automated system lists confidence at 80%, manual analysis raises this to High/Near-Certainty. The convergence of a deceptive name ("updater"), an unverified publisher, and specific, high-fidelity YARA matches for persistence and obfuscation leaves little room for benign interpretation. This is a textbook example of a malicious supply chain attack targeting developers.


Disclaimer

This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.

Frequently Asked Questions