Is "updater" on VS Code Marketplace Safe to Install?
update your vs code by developer's choice extension
Risk Assessment
Pending0 security findings detected across all analyzers
VS Code extension analyzed via package manifest and static code analysis
No Threats Detected
This extension passed all security checks
About This Extension
No Findings
All security checks passed
AI Security Report
AI Security Analysis: updater
Analysis generated: 2025-12-11T23:00:40+13:00
Model: gemini-3-pro-preview
Quick Facts
| Property | Value |
|---|---|
| UUID | 0284f2cf-066f-5670-a4e1-cf9a0fa2d78b |
| Type | vscode |
| Version | 0.0.7 |
| Users | 41 |
| Risk Score | 100.0/100 (CRITICAL) |
| Malware Detected | ⚠️ Yes |
| Secrets Exposed | ✅ No |
| Critical Vulns | ✅ No |
AI Analysis
Executive Summary
The extension "updater" (Version 0.0.7) presents a CRITICAL security threat and should be considered malicious. It employs social engineering tactics by masquerading as a legitimate system update tool. The analysis detects aggressive behaviors consistent with malware, including unauthorized file manipulation, network communication, and attempts to establish persistence on the host system immediately upon installation. Do not install this extension. If installed, remove it immediately and initiate incident response procedures.
Threat Assessment
The extension exhibits the characteristics of a "Trojan Horse" or a "Dropper."
- Social Engineering: The name "updater" and the description "update your vs code by developer's choice" are designed to trick users into believing this is a necessary maintenance tool. VS Code handles its own updates; no extension is required for this function.
- Malicious Behavior (Post-Install Scripts): The vast majority of high-severity findings relate to
postinstallevents. In the Node.js/VS Code ecosystem,postinstallscripts execute automatically as soon as the extension is installed, requiring no further user interaction. - Attack Chain Indicators: The findings suggest a specific attack chain:
- Execution:
postinstall_system_commandindicates arbitrary code execution. - Payload Delivery:
postinstall_file_downloadsuggests it fetches a secondary payload from an external server. - Entrenchment:
postinstall_persistence_mechanismindicates it attempts to modify system settings (like Registry keys or Cron jobs) to survive system reboots. - Evasion:
postinstall_obfuscationsuggests the code is intentionally hidden to bypass static analysis.
- Execution:
Risk Justification
The Risk Score of 100/100 is fully justified and accurate.
- Malicious Intent: The combination of a deceptive name ("updater") and an unverified publisher ("Arshdeep") is a primary indicator of bad intent.
- Severity of Capabilities: The extension triggers YARA rules for persistence, obfuscation, and system command execution. These are not behaviors found in legitimate developer tools.
- Anomalous Volume: The total of 30,840 findings is highly abnormal for a VS Code extension. This suggests the extension may contain a large, obfuscated malicious binary or a compromised dependency tree that is triggering mass alerts.
- Zero Trust: The Trust Score of 0.0 reflects the lack of publisher verification and community reputation (only 41 users).
Key Findings
- Persistence Mechanisms (
postinstall_persistence_mechanism)- Significance: This is the most critical technical finding. It indicates the extension attempts to modify the host OS to ensure the malicious code runs every time the computer starts, turning a temporary extension install into a long-term compromise.
- System Command Execution (
postinstall_system_command)- Significance: The extension is executing shell commands directly on the host OS. Combined with the "updater" guise, this likely mimics a system update process while performing malicious actions.
- Obfuscated Code (
postinstall_obfuscation)- Significance: Legitimate open-source extensions rarely use heavy obfuscation. This is used almost exclusively to hide malicious logic from scanners and analysts.
- Network & Download Activity (
postinstall_network_communication,postinstall_file_download)- Significance: The extension initiates network connections immediately upon install, likely to report to a Command & Control (C2) server or download a second-stage payload (ransomware, stealer, etc.).
Recommendations
- Immediate Removal: Uninstall the extension immediately from all affected environments.
- Blocklist Implementation: Add the Extension UUID (
0284f2cf-066f-5670-a4e1-cf9a0fa2d78b) to the organization's VS Code extension blocklist to prevent future installation. - Incident Response: For the 41 users who installed this:
- Isolate the affected machines from the network.
- Scan for persistence mechanisms (e.g., check Windows Task Scheduler, Registry Run keys, or Linux Cron jobs).
- Reset credentials, as the extension may have scraped environment variables or secrets.
- Network Blocking: Investigate the 123 network findings (not detailed in the summary but present in the overview) to identify and block the C2 domains/IPs at the firewall level.
Mitigation Strategies
There is no safe way to use this extension.
Unlike legitimate extensions with vulnerabilities that can be patched or mitigated, this extension appears to be inherently malicious by design.
- Strict Prohibition: The only mitigation is to ensure it is never installed.
- Sandbox Analysis (Research Only): If analysis is required, it must be performed in a disposable, air-gapped sandbox environment with no access to production networks or credentials.
Confidence Assessment
Confidence Level: High (95%)
While the automated system lists confidence at 80%, manual analysis raises this to High/Near-Certainty. The convergence of a deceptive name ("updater"), an unverified publisher, and specific, high-fidelity YARA matches for persistence and obfuscation leaves little room for benign interpretation. This is a textbook example of a malicious supply chain attack targeting developers.
Disclaimer
This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace
Acrolinx for Visual Studio Code
Acrolinx
p4-lang
Zhanghan Wang
Augment: Coding Agent Built for Large, Complex Codebases
Augment Computing
CodeLangTest
yangpan
REVIS
Ruochen Wang
Quarkus Pro
redmat