Is "Sysy2022E 扩展语言编辑器" on VS Code Marketplace Safe to Install?

Code Wrong Team · vscode · v1.0.0

A coure design for software engineering in USTB

Risk Assessment

Pending
0
out of 100
MINIMAL

0 security findings detected across all analyzers

VS Code extension analyzed via package manifest and static code analysis

No Threats Detected

This extension passed all security checks

About This Extension

A coure design for software engineering in USTB

No Findings

All security checks passed

AI Security Report

AI Security Analysis: Sysy2022E 扩展语言编辑器

Analysis generated: 2025-12-12T23:30:47+13:00
Model: gemini-3-pro-preview


Quick Facts

Property Value
UUID 0660e13f-ee57-5640-9dec-072b30b60d37
Type vscode
Version 1.0.0
Users 207
Risk Score 100.0/100 (CRITICAL)
Malware Detected ⚠️ Yes
Secrets Exposed ✅ No
Critical Vulns ✅ No

AI Analysis

Based on the provided security scan data, here is the analysis for the "Sysy2022E 扩展语言编辑器" VS Code extension.

Executive Summary

The extension "Sysy2022E 扩展语言编辑器" presents a CRITICAL security risk (Risk Score: 100/100). Although described as a university software engineering course project (USTB), the extension contains nearly 5,000 high-severity malware signatures and over 13,000 Indicators of Compromise (IOCs). The findings strongly suggest the presence of malicious "post-install" scripts capable of executing system commands, manipulating files, and accessing the network immediately upon installation. Do not install this extension.

Threat Assessment

The security posture of this extension is extremely poor, exhibiting characteristics typical of a supply chain attack or a severely compromised development environment.

  • Malicious Execution Vector (Post-Install Scripts): The most alarming findings are the repeated YARA matches for postinstall activities (e.g., postinstall_system_command, postinstall_environment_access). In the Node.js/VS Code ecosystem, post-install scripts run automatically when the extension is installed, requiring no user interaction to trigger potential malware.
  • System Integrity Risk: The analysis detected capabilities for file manipulation and obfuscation. This indicates the extension attempts to hide its logic while modifying files on the host system, a behavior consistent with ransomware or persistence mechanisms.
  • Massive Indicator Volume: The presence of 18,680 total findings, including 13,567 IOCs (likely IP addresses or domains associated with malicious activity) and 4,949 malware signatures, suggests the extension may inadvertently include a massive library of known malicious code (e.g., a compromised node_modules dependency tree) or is acting as a wrapper for a malicious payload.
  • Publisher Trust: The publisher "Code Wrong Team" is unverified. Given the description references a student course design, it is highly probable that the developers unknowingly included a compromised dependency or their development environment was infected, injecting malware into the build artifact.

Risk Justification

The 100/100 (CRITICAL) risk score is fully justified based on the following:

  • Severity of Capabilities: The extension has confirmed signatures for executing system commands (exec/spawn), accessing environment variables (credential theft risk), and obfuscating code to evade detection.
  • Automation: The postinstall nature of the findings means the threat activates immediately upon installation.
  • Volume of Evidence: nearly 5,000 High-Severity malware signature matches provide overwhelming evidence of malicious code structures.
  • Lack of Mitigation: There are no apparent mitigating factors; the publisher is unverified, and the code is obfuscated.

Key Findings

  • Post-Install System Command Execution: Multiple YARA matches for postinstall_system_command indicate the extension attempts to run shell commands on the host OS immediately after installation.
  • Obfuscation Techniques: Findings for postinstall_obfuscation suggest the code has been intentionally scrambled to hinder analysis, which is highly suspicious in an academic open-source project.
  • File System Manipulation: Matches for postinstall_file_manipulation indicate the extension attempts to create, modify, or delete files outside its standard scope.
  • Environment Variable Access: The extension attempts to read environment variables (postinstall_environment_access), a common technique used to steal API keys, tokens, and system secrets.
  • Network Communication: 152 network findings combined with postinstall_network_communication signatures suggest the extension attempts to "phone home" or download additional payloads.

Recommendations

  1. BLOCK AND UNINSTALL: Immediate removal is required. If this extension is present in an organization, block it via policy.
  2. Incident Response: If this extension was installed on a machine with access to sensitive data, treat the machine as compromised. Rotate any credentials (SSH keys, API tokens, AWS secrets) present in the environment variables or file system of that machine.
  3. Sandbox Analysis (Optional): If forensic confirmation is required, analyze the .vsix package in an isolated, air-gapped sandbox to determine the specific Command & Control (C2) servers it contacts.
  4. Notification: If possible, notify the university (USTB) or the platform store administrators that this project likely contains compromised dependencies or malware.

Mitigation Strategies

If this extension is absolutely required for a specific academic course, the following strict mitigations must be applied:

  1. Strict Isolation: Only run this extension inside a disposable DevContainer or a non-persistent Virtual Machine. Never install it on a host operating system.
  2. Network Air-Gapping: Disable network access for the container/VM where the extension is installed to prevent data exfiltration or payload downloading.
  3. Credential Isolation: Ensure no sensitive environment variables or credentials are mounted into the container running this extension.

Confidence Assessment

Confidence Level: 80%
The high volume of specific YARA matches targeting postinstall behaviors provides high confidence that the code is dangerous. The slight reduction from 100% confidence is due to the context of it being a student project; it is possible (though unlikely) that a massive, legitimate framework with poor coding practices is triggering these heuristics. However, from a defensive standpoint, the risk is identical regardless of intent.


Disclaimer

This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.

Frequently Asked Questions