Is "Sysy2022E 扩展语言编辑器" on VS Code Marketplace Safe to Install?
A coure design for software engineering in USTB
Risk Assessment
Pending0 security findings detected across all analyzers
VS Code extension analyzed via package manifest and static code analysis
No Threats Detected
This extension passed all security checks
About This Extension
No Findings
All security checks passed
AI Security Report
AI Security Analysis: Sysy2022E 扩展语言编辑器
Analysis generated: 2025-12-12T23:30:47+13:00
Model: gemini-3-pro-preview
Quick Facts
| Property | Value |
|---|---|
| UUID | 0660e13f-ee57-5640-9dec-072b30b60d37 |
| Type | vscode |
| Version | 1.0.0 |
| Users | 207 |
| Risk Score | 100.0/100 (CRITICAL) |
| Malware Detected | ⚠️ Yes |
| Secrets Exposed | ✅ No |
| Critical Vulns | ✅ No |
AI Analysis
Based on the provided security scan data, here is the analysis for the "Sysy2022E 扩展语言编辑器" VS Code extension.
Executive Summary
The extension "Sysy2022E 扩展语言编辑器" presents a CRITICAL security risk (Risk Score: 100/100). Although described as a university software engineering course project (USTB), the extension contains nearly 5,000 high-severity malware signatures and over 13,000 Indicators of Compromise (IOCs). The findings strongly suggest the presence of malicious "post-install" scripts capable of executing system commands, manipulating files, and accessing the network immediately upon installation. Do not install this extension.
Threat Assessment
The security posture of this extension is extremely poor, exhibiting characteristics typical of a supply chain attack or a severely compromised development environment.
- Malicious Execution Vector (Post-Install Scripts): The most alarming findings are the repeated YARA matches for
postinstallactivities (e.g.,postinstall_system_command,postinstall_environment_access). In the Node.js/VS Code ecosystem, post-install scripts run automatically when the extension is installed, requiring no user interaction to trigger potential malware. - System Integrity Risk: The analysis detected capabilities for file manipulation and obfuscation. This indicates the extension attempts to hide its logic while modifying files on the host system, a behavior consistent with ransomware or persistence mechanisms.
- Massive Indicator Volume: The presence of 18,680 total findings, including 13,567 IOCs (likely IP addresses or domains associated with malicious activity) and 4,949 malware signatures, suggests the extension may inadvertently include a massive library of known malicious code (e.g., a compromised
node_modulesdependency tree) or is acting as a wrapper for a malicious payload. - Publisher Trust: The publisher "Code Wrong Team" is unverified. Given the description references a student course design, it is highly probable that the developers unknowingly included a compromised dependency or their development environment was infected, injecting malware into the build artifact.
Risk Justification
The 100/100 (CRITICAL) risk score is fully justified based on the following:
- Severity of Capabilities: The extension has confirmed signatures for executing system commands (
exec/spawn), accessing environment variables (credential theft risk), and obfuscating code to evade detection. - Automation: The
postinstallnature of the findings means the threat activates immediately upon installation. - Volume of Evidence: nearly 5,000 High-Severity malware signature matches provide overwhelming evidence of malicious code structures.
- Lack of Mitigation: There are no apparent mitigating factors; the publisher is unverified, and the code is obfuscated.
Key Findings
- Post-Install System Command Execution: Multiple YARA matches for
postinstall_system_commandindicate the extension attempts to run shell commands on the host OS immediately after installation. - Obfuscation Techniques: Findings for
postinstall_obfuscationsuggest the code has been intentionally scrambled to hinder analysis, which is highly suspicious in an academic open-source project. - File System Manipulation: Matches for
postinstall_file_manipulationindicate the extension attempts to create, modify, or delete files outside its standard scope. - Environment Variable Access: The extension attempts to read environment variables (
postinstall_environment_access), a common technique used to steal API keys, tokens, and system secrets. - Network Communication: 152 network findings combined with
postinstall_network_communicationsignatures suggest the extension attempts to "phone home" or download additional payloads.
Recommendations
- BLOCK AND UNINSTALL: Immediate removal is required. If this extension is present in an organization, block it via policy.
- Incident Response: If this extension was installed on a machine with access to sensitive data, treat the machine as compromised. Rotate any credentials (SSH keys, API tokens, AWS secrets) present in the environment variables or file system of that machine.
- Sandbox Analysis (Optional): If forensic confirmation is required, analyze the
.vsixpackage in an isolated, air-gapped sandbox to determine the specific Command & Control (C2) servers it contacts. - Notification: If possible, notify the university (USTB) or the platform store administrators that this project likely contains compromised dependencies or malware.
Mitigation Strategies
If this extension is absolutely required for a specific academic course, the following strict mitigations must be applied:
- Strict Isolation: Only run this extension inside a disposable DevContainer or a non-persistent Virtual Machine. Never install it on a host operating system.
- Network Air-Gapping: Disable network access for the container/VM where the extension is installed to prevent data exfiltration or payload downloading.
- Credential Isolation: Ensure no sensitive environment variables or credentials are mounted into the container running this extension.
Confidence Assessment
Confidence Level: 80%
The high volume of specific YARA matches targeting postinstall behaviors provides high confidence that the code is dangerous. The slight reduction from 100% confidence is due to the context of it being a student project; it is possible (though unlikely) that a massive, legitimate framework with poor coding practices is triggering these heuristics. However, from a defensive standpoint, the risk is identical regardless of intent.
Disclaimer
This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace