Is "Agents" on OpenVSX Registry Safe to Install?

swarmify · openvsx · v0.5.1

Manage a Mix of Agents with `/swarm` (Claude Code, Codex, Gemini, Cursor) inside the editor

Risk Assessment

Analyzed
100
out of 100
CRITICAL

1883 security findings detected across all analyzers

Open VSX extension analyzed via package manifest and static code analysis

Severity Breakdown

0
Critical
153
High
1610
Medium
0
Low
0
Info

Finding Categories

153
Malware Signatures
35
Network
788
IoC Indicators

YARA Rules Matched

15 rules(153 hits)
postinstall system command credential env files postinstall obfuscation postinstall network communication postinstall file download postinstall persistence mechanism postinstall crypto operations postinstall file manipulation NoUseWeakRandom DebuggerStatementsShouldNotBeUsed postinstall registry modification OriginsNotVerified SQLInjection UsingShellInterpreterWhenExecutingOSCommands postinstall environment access

About This Extension

Manage a Mix of Agents with `/swarm` (Claude Code, Codex, Gemini, Cursor) inside the editor

Detailed Findings

188 total

YARA Rule Matches

15 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
283
IP Addresses
27
Domains
470
Strings
788

All Indicators · 788

URL
detected URL: https://github.com/login/oauth/authorize');

XIOC detected URL: https://github.com/login/oauth/authorize');

extracted_from_files

Domain
detected Domain: h.bottom-h.top

XIOC detected Domain: h.bottom-h.top

extracted_from_files

Domain
detected Domain: e.bottom-e.top

XIOC detected Domain: e.bottom-e.top

extracted_from_files

Domain
detected Domain: h.top-e.top

XIOC detected Domain: h.top-e.top

extracted_from_files

Domain
detected Domain: h.top

XIOC detected Domain: h.top

extracted_from_files

Domain
detected Domain: e.top

XIOC detected Domain: e.top

extracted_from_files

Domain
detected Domain: y2.documentelement.style

XIOC detected Domain: y2.documentelement.style

extracted_from_files

Domain
detected Domain: e.host

XIOC detected Domain: e.host

extracted_from_files

Domain
detected Domain: e.top-n.top

XIOC detected Domain: e.top-n.top

extracted_from_files

Domain
detected Domain: n.top

XIOC detected Domain: n.top

extracted_from_files

Domain
detected Domain: i.top

XIOC detected Domain: i.top

extracted_from_files

Domain
detected Domain: t.top

XIOC detected Domain: t.top

extracted_from_files

Domain
detected Domain: l.top

XIOC detected Domain: l.top

extracted_from_files

Domain
detected Domain: v.top

XIOC detected Domain: v.top

extracted_from_files

Domain
detected Domain: f.top

XIOC detected Domain: f.top

extracted_from_files

Domain
detected Domain: this.mark.type.name

XIOC detected Domain: this.mark.type.name

extracted_from_files

Domain
detected Domain: l.bottom-p.top

XIOC detected Domain: l.bottom-p.top

extracted_from_files

Domain
detected Domain: p.bottom-l.top

XIOC detected Domain: p.bottom-l.top

extracted_from_files

Domain
detected Domain: l.top-p.top

XIOC detected Domain: l.top-p.top

extracted_from_files

Domain
detected Domain: p.top

XIOC detected Domain: p.top

extracted_from_files

Domain
detected Domain: array.prototype.find.call

XIOC detected Domain: array.prototype.find.call

extracted_from_files

Domain
detected Domain: n.bottom-n.top

XIOC detected Domain: n.bottom-n.top

extracted_from_files

Domain
detected Domain: span.apple

XIOC detected Domain: span.apple

extracted_from_files

Domain
detected Domain: t.state.tr

XIOC detected Domain: t.state.tr

extracted_from_files

Domain
detected Domain: s.top

XIOC detected Domain: s.top

extracted_from_files

Domain
detected Domain: n.style

XIOC detected Domain: n.style

extracted_from_files

Domain
detected Domain: i.style

XIOC detected Domain: i.style

extracted_from_files

Domain
detected Domain: e.state.selection.to

XIOC detected Domain: e.state.selection.to

extracted_from_files

Domain
detected Domain: this.node.type.name

XIOC detected Domain: this.node.type.name

extracted_from_files

Domain
detected Domain: n.target

XIOC detected Domain: n.target

extracted_from_files

Domain
detected Domain: r.to

XIOC detected Domain: r.to

extracted_from_files

Domain
detected Domain: i.to

XIOC detected Domain: i.to

extracted_from_files

Domain
detected Domain: n.pos-this.view.state.selection.to

XIOC detected Domain: n.pos-this.view.state.selection.to

extracted_from_files

Domain
detected Domain: h.to

XIOC detected Domain: h.to

extracted_from_files

Domain
detected Domain: i.target

XIOC detected Domain: i.target

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: s.to

XIOC detected Domain: s.to

extracted_from_files

Domain
detected Domain: t.to-e.to

XIOC detected Domain: t.to-e.to

extracted_from_files

Domain
detected Domain: this.members.map

XIOC detected Domain: this.members.map

extracted_from_files

Domain
detected Domain: ko.is

XIOC detected Domain: ko.is

extracted_from_files

Domain
detected Domain: g.to

XIOC detected Domain: g.to

extracted_from_files

Domain
detected Domain: this.type.map

XIOC detected Domain: this.type.map

extracted_from_files

Domain
detected Domain: f.mapping.map

XIOC detected Domain: f.mapping.map

extracted_from_files

Domain
detected Domain: u.mapping.map

XIOC detected Domain: u.mapping.map

extracted_from_files

Domain
detected Domain: e.call

XIOC detected Domain: e.call

extracted_from_files

Domain
detected Domain: n.host

XIOC detected Domain: n.host

extracted_from_files

Domain
detected Domain: v.mapping.map

XIOC detected Domain: v.mapping.map

extracted_from_files

Domain
detected Domain: t.state.selection.to

XIOC detected Domain: t.state.selection.to

extracted_from_files

Domain
detected Domain: array.prototype.indexof.call

XIOC detected Domain: array.prototype.indexof.call

extracted_from_files

Domain
detected Domain: this.observer

XIOC detected Domain: this.observer

extracted_from_files

Domain
detected Domain: s.tr

XIOC detected Domain: s.tr

extracted_from_files

Domain
detected Domain: i.mapping.map

XIOC detected Domain: i.mapping.map

extracted_from_files

Domain
detected Domain: r.mapping.map

XIOC detected Domain: r.mapping.map

extracted_from_files

Domain
detected Domain: t.tr

XIOC detected Domain: t.tr

extracted_from_files

Domain
detected Domain: n.tr

XIOC detected Domain: n.tr

extracted_from_files

Domain
detected Domain: p.mapping.map

XIOC detected Domain: p.mapping.map

extracted_from_files

Domain
detected Domain: e.tr

XIOC detected Domain: e.tr

extracted_from_files

Domain
detected Domain: h.call

XIOC detected Domain: h.call

extracted_from_files

Domain
detected Domain: t.name

XIOC detected Domain: t.name

extracted_from_files

Domain
detected Domain: v.map

XIOC detected Domain: v.map

extracted_from_files

Domain
detected Domain: h.storage

XIOC detected Domain: h.storage

extracted_from_files

Domain
detected Domain: l.storage

XIOC detected Domain: l.storage

extracted_from_files

Domain
detected Domain: this.off

XIOC detected Domain: this.off

extracted_from_files

Domain
detected Domain: i.tr

XIOC detected Domain: i.tr

extracted_from_files

Domain
detected Domain: n.storage

XIOC detected Domain: n.storage

extracted_from_files

Domain
detected Domain: n.parent.name

XIOC detected Domain: n.parent.name

extracted_from_files

Domain
detected Domain: this.storage

XIOC detected Domain: this.storage

extracted_from_files

Domain
detected Domain: this.config.name

XIOC detected Domain: this.config.name

extracted_from_files

Domain
detected Domain: f.state.tr

XIOC detected Domain: f.state.tr

extracted_from_files

Domain
detected Domain: n.data

XIOC detected Domain: n.data

extracted_from_files

Domain
detected Domain: i.data

XIOC detected Domain: i.data

extracted_from_files

Domain
detected Domain: v.to

XIOC detected Domain: v.to

extracted_from_files

Domain
detected Domain: v.target

XIOC detected Domain: v.target

extracted_from_files

Domain
detected Domain: p.tr

XIOC detected Domain: p.tr

extracted_from_files

Domain
detected Domain: n.tr.mapping.map

XIOC detected Domain: n.tr.mapping.map

extracted_from_files

Domain
detected Domain: r.data

XIOC detected Domain: r.data

extracted_from_files

Domain
detected Domain: s.data

XIOC detected Domain: s.data

extracted_from_files

Domain
detected Domain: i.map

XIOC detected Domain: i.map

extracted_from_files

Domain
detected Domain: n.selection.to

XIOC detected Domain: n.selection.to

extracted_from_files

Domain
detected Domain: t.to

XIOC detected Domain: t.to

extracted_from_files

Domain
detected Domain: f.type.name

XIOC detected Domain: f.type.name

extracted_from_files

Domain
detected Domain: e.storage

XIOC detected Domain: e.storage

extracted_from_files

Domain
detected Domain: i.storage

XIOC detected Domain: i.storage

extracted_from_files

Domain
detected Domain: i.name

XIOC detected Domain: i.name

extracted_from_files

Domain
detected Domain: r.name

XIOC detected Domain: r.name

extracted_from_files

Domain
detected Domain: n.newrange.to

XIOC detected Domain: n.newrange.to

extracted_from_files

Domain
detected Domain: s.oldrange.to

XIOC detected Domain: s.oldrange.to

extracted_from_files

Domain
detected Domain: n.oldrange.to

XIOC detected Domain: n.oldrange.to

extracted_from_files

Domain
detected Domain: u.type.name

XIOC detected Domain: u.type.name

extracted_from_files

Domain
detected Domain: g.node.type.name

XIOC detected Domain: g.node.type.name

extracted_from_files

Domain
detected Domain: h.map

XIOC detected Domain: h.map

extracted_from_files

Domain
detected Domain: t.map

XIOC detected Domain: t.map

extracted_from_files

Domain
detected Domain: r.type.name

XIOC detected Domain: r.type.name

extracted_from_files

Domain
detected Domain: u.top

XIOC detected Domain: u.top

extracted_from_files

Domain
detected Domain: g.mark.type.name

XIOC detected Domain: g.mark.type.name

extracted_from_files

Domain
detected Domain: marks.map

XIOC detected Domain: marks.map

extracted_from_files

Domain
detected Domain: g.type.name

XIOC detected Domain: g.type.name

extracted_from_files

Domain
detected Domain: r.marks.map

XIOC detected Domain: r.marks.map

extracted_from_files

Domain
detected Domain: s.newrange.to

XIOC detected Domain: s.newrange.to

extracted_from_files

Domain
detected Domain: r.node.type.name

XIOC detected Domain: r.node.type.name

extracted_from_files

Domain
detected Domain: g.parent.type.name

XIOC detected Domain: g.parent.type.name

extracted_from_files

Domain
detected Domain: u.docs

XIOC detected Domain: u.docs

extracted_from_files

Domain
detected Domain: v.type.name

XIOC detected Domain: v.type.name

extracted_from_files

Domain
detected Domain: b.node.type.name

XIOC detected Domain: b.node.type.name

extracted_from_files

Domain
detected Domain: d.type.name

XIOC detected Domain: d.type.name

extracted_from_files

Domain
detected Domain: e.mapping.map

XIOC detected Domain: e.mapping.map

extracted_from_files

Domain
detected Domain: s.style

XIOC detected Domain: s.style

extracted_from_files

Domain
detected Domain: f.search

XIOC detected Domain: f.search

extracted_from_files

Domain
detected Domain: s.type.name

XIOC detected Domain: s.type.name

extracted_from_files

Domain
detected Domain: s.mapping.map

XIOC detected Domain: s.mapping.map

extracted_from_files

Domain
detected Domain: u.search

XIOC detected Domain: u.search

extracted_from_files

Domain
detected Domain: this.state.tr

XIOC detected Domain: this.state.tr

extracted_from_files

Domain
detected Domain: l.node.type.name

XIOC detected Domain: l.node.type.name

extracted_from_files

Domain
detected Domain: u.bottom-u.top

XIOC detected Domain: u.bottom-u.top

extracted_from_files

Domain
detected Domain: r.host

XIOC detected Domain: r.host

extracted_from_files

Domain
detected Domain: t.host

XIOC detected Domain: t.host

extracted_from_files

Domain
detected Domain: i.host

XIOC detected Domain: i.host

extracted_from_files

Domain
detected Domain: t.brands.map

XIOC detected Domain: t.brands.map

extracted_from_files

Domain
detected Domain: e.elements.arrow.style

XIOC detected Domain: e.elements.arrow.style

extracted_from_files

Domain
detected Domain: e.elements.popper.style

XIOC detected Domain: e.elements.popper.style

extracted_from_files

Domain
detected Domain: u.box

XIOC detected Domain: u.box

extracted_from_files

Domain
detected Domain: slice.call

XIOC detected Domain: slice.call

extracted_from_files

Domain
detected Domain: tostring.call

XIOC detected Domain: tostring.call

extracted_from_files

Domain
detected Domain: pe.data

XIOC detected Domain: pe.data

extracted_from_files

Domain
detected Domain: pe.name

XIOC detected Domain: pe.name

extracted_from_files

Domain
detected Domain: k.top

XIOC detected Domain: k.top

extracted_from_files

Domain
detected Domain: b.top-j.top

XIOC detected Domain: b.top-j.top

extracted_from_files

Domain
detected Domain: c.show

XIOC detected Domain: c.show

extracted_from_files

Domain
detected Domain: le.box

XIOC detected Domain: le.box

extracted_from_files

Domain
detected Domain: ge.target

XIOC detected Domain: ge.target

extracted_from_files

Domain
detected Domain: k.target

XIOC detected Domain: k.target

extracted_from_files

Domain
detected Domain: w.map

XIOC detected Domain: w.map

extracted_from_files

Domain
detected Domain: c.id

XIOC detected Domain: c.id

extracted_from_files

Domain
detected Domain: d.id

XIOC detected Domain: d.id

extracted_from_files

Domain
detected Domain: this.show

XIOC detected Domain: this.show

extracted_from_files

Domain
detected Domain: g.call

XIOC detected Domain: g.call

extracted_from_files

Domain
detected Domain: n.elements.arrow.style

XIOC detected Domain: n.elements.arrow.style

extracted_from_files

Domain
detected Domain: n.elements.popper.style

XIOC detected Domain: n.elements.popper.style

extracted_from_files

Domain
detected Domain: ge.box

XIOC detected Domain: ge.box

extracted_from_files

Domain
detected Domain: o.box

XIOC detected Domain: o.box

extracted_from_files

Domain
detected Domain: jt.box

XIOC detected Domain: jt.box

extracted_from_files

Domain
detected Domain: window.next

XIOC detected Domain: window.next

extracted_from_files

Domain
detected Domain: n.watch

XIOC detected Domain: n.watch

extracted_from_files

Domain
detected Domain: i.off

XIOC detected Domain: i.off

extracted_from_files

Domain
detected Domain: this.watch

XIOC detected Domain: this.watch

extracted_from_files

Domain
detected Domain: this.editor.off

XIOC detected Domain: this.editor.off

extracted_from_files

Domain
detected Domain: l.step.map

XIOC detected Domain: l.step.map

extracted_from_files

Domain
detected Domain: y.selection.map

XIOC detected Domain: y.selection.map

extracted_from_files

Domain
detected Domain: this.options.htmlattributes.target

XIOC detected Domain: this.options.htmlattributes.target

extracted_from_files

Domain
detected Domain: youtu.be

XIOC detected Domain: youtu.be

extracted_from_files

Domain
detected Domain: f.target

XIOC detected Domain: f.target

extracted_from_files

Domain
detected Domain: k.to

XIOC detected Domain: k.to

extracted_from_files

Domain
detected Domain: l.target

XIOC detected Domain: l.target

extracted_from_files

Domain
detected Domain: this.tk

XIOC detected Domain: this.tk

extracted_from_files

Domain
detected Domain: t.tt

XIOC detected Domain: t.tt

extracted_from_files

Domain
detected Domain: this.options.types.map

XIOC detected Domain: this.options.types.map

extracted_from_files

Domain
detected Domain: p.target

XIOC detected Domain: p.target

extracted_from_files

Domain
detected Domain: window.open

XIOC detected Domain: window.open

extracted_from_files

Domain
detected Domain: table.name

XIOC detected Domain: table.name

extracted_from_files

Domain
detected Domain: e.data

XIOC detected Domain: e.data

extracted_from_files

Domain
detected Domain: this.data

XIOC detected Domain: this.data

extracted_from_files

Domain
detected Domain: h.target

XIOC detected Domain: h.target

extracted_from_files

Domain
detected Domain: this.regexes.map

XIOC detected Domain: this.regexes.map

extracted_from_files

Domain
detected Domain: t.case

XIOC detected Domain: t.case

extracted_from_files

Domain
detected Domain: r.spec.filtertransaction.call

XIOC detected Domain: r.spec.filtertransaction.call

extracted_from_files

Domain
detected Domain: l.contains.map

XIOC detected Domain: l.contains.map

extracted_from_files

Domain
detected Domain: t.data

XIOC detected Domain: t.data

extracted_from_files

Domain
detected Domain: t.mapping.map

XIOC detected Domain: t.mapping.map

extracted_from_files

Domain
detected Domain: e.show

XIOC detected Domain: e.show

extracted_from_files

Domain
detected Domain: l.map

XIOC detected Domain: l.map

extracted_from_files

Domain
detected Domain: this.map

XIOC detected Domain: this.map

extracted_from_files

Domain
detected Domain: www.youtube.com

XIOC detected Domain: www.youtube.com

extracted_from_files

Domain
detected Domain: this.tt

XIOC detected Domain: this.tt

extracted_from_files

Domain
detected Domain: r.tt

XIOC detected Domain: r.tt

extracted_from_files

Domain
detected Domain: y.type.name

XIOC detected Domain: y.type.name

extracted_from_files

Domain
detected Domain: this.options.levels.map

XIOC detected Domain: this.options.levels.map

extracted_from_files

Domain
detected Domain: n.prototype.map

XIOC detected Domain: n.prototype.map

extracted_from_files

Domain
detected Domain: g.map

XIOC detected Domain: g.map

extracted_from_files

Domain
detected Domain: g.step.map

XIOC detected Domain: g.step.map

extracted_from_files

Domain
detected Domain: g.selection.map

XIOC detected Domain: g.selection.map

extracted_from_files

Domain
detected Domain: e.docs

XIOC detected Domain: e.docs

extracted_from_files

Domain
detected Domain: s.call

XIOC detected Domain: s.call

extracted_from_files

Domain
detected Domain: t.as

XIOC detected Domain: t.as

extracted_from_files

Domain
detected Domain: e.parent.type.name

XIOC detected Domain: e.parent.type.name

extracted_from_files

Domain
detected Domain: g.top

XIOC detected Domain: g.top

extracted_from_files

Domain
detected Domain: this.element.style.top

XIOC detected Domain: this.element.style.top

extracted_from_files

Domain
detected Domain: i.bottom-i.top

XIOC detected Domain: i.bottom-i.top

extracted_from_files

Domain
detected Domain: t.storage

XIOC detected Domain: t.storage

extracted_from_files

Domain
detected Domain: i.selection.to

XIOC detected Domain: i.selection.to

extracted_from_files

Domain
detected Domain: l.selection.map

XIOC detected Domain: l.selection.map

extracted_from_files

Domain
detected Domain: t.re

XIOC detected Domain: t.re

extracted_from_files

Domain
detected Domain: head.parent.type.name

XIOC detected Domain: head.parent.type.name

extracted_from_files

Domain
detected Domain: l.call

XIOC detected Domain: l.call

extracted_from_files

Domain
detected Domain: n.properties

XIOC detected Domain: n.properties

extracted_from_files

Domain
detected Domain: ee.name

XIOC detected Domain: ee.name

extracted_from_files

Domain
detected Domain: re.case

XIOC detected Domain: re.case

extracted_from_files

Domain
detected Domain: t.variants.map

XIOC detected Domain: t.variants.map

extracted_from_files

Domain
detected Domain: is.na

XIOC detected Domain: is.na

extracted_from_files

Domain
detected Domain: is.call

XIOC detected Domain: is.call

extracted_from_files

Domain
detected Domain: as.call

XIOC detected Domain: as.call

extracted_from_files

Domain
detected Domain: month.name

XIOC detected Domain: month.name

extracted_from_files

Domain
detected Domain: month.abb

XIOC detected Domain: month.abb

extracted_from_files

Domain
detected Domain: ke.map

XIOC detected Domain: ke.map

extracted_from_files

Domain
detected Domain: me.data

XIOC detected Domain: me.data

extracted_from_files

Domain
detected Domain: oe.data

XIOC detected Domain: oe.data

extracted_from_files

Domain
detected Domain: o.map

XIOC detected Domain: o.map

extracted_from_files

Domain
detected Domain: oe.map

XIOC detected Domain: oe.map

extracted_from_files

Domain
detected Domain: y.data

XIOC detected Domain: y.data

extracted_from_files

Domain
detected Domain: b.map

XIOC detected Domain: b.map

extracted_from_files

Domain
detected Domain: seq.int

XIOC detected Domain: seq.int

extracted_from_files

Domain
detected Domain: is.name

XIOC detected Domain: is.name

extracted_from_files

Domain
detected Domain: t.search

XIOC detected Domain: t.search

extracted_from_files

Domain
detected Domain: v.data

XIOC detected Domain: v.data

extracted_from_files

Domain
detected Domain: ke.name

XIOC detected Domain: ke.name

extracted_from_files

Domain
detected Domain: an.case

XIOC detected Domain: an.case

extracted_from_files

Domain
detected Domain: o.variants.map

XIOC detected Domain: o.variants.map

extracted_from_files

Domain
detected Domain: e.contains.map

XIOC detected Domain: e.contains.map

extracted_from_files

Domain
detected Domain: o.case

XIOC detected Domain: o.case

extracted_from_files

Domain
detected Domain: this.info

XIOC detected Domain: this.info

extracted_from_files

Domain
detected Domain: ui.prototype.at

XIOC detected Domain: ui.prototype.at

extracted_from_files

Domain
detected Domain: s.info

XIOC detected Domain: s.info

extracted_from_files

Domain
detected Domain: ob.call

XIOC detected Domain: ob.call

extracted_from_files

Domain
detected Domain: bn.zero

XIOC detected Domain: bn.zero

extracted_from_files

Domain
detected Domain: t.zero

XIOC detected Domain: t.zero

extracted_from_files

Domain
detected Domain: this.search

XIOC detected Domain: this.search

extracted_from_files

Domain
detected Domain: d.map

XIOC detected Domain: d.map

extracted_from_files

Domain
detected Domain: k.map

XIOC detected Domain: k.map

extracted_from_files

Domain
detected Domain: i.info

XIOC detected Domain: i.info

extracted_from_files

Domain
detected Domain: c.info

XIOC detected Domain: c.info

extracted_from_files

Domain
detected Domain: w.info

XIOC detected Domain: w.info

extracted_from_files

Domain
detected Domain: t.md

XIOC detected Domain: t.md

extracted_from_files

Domain
detected Domain: this.md

XIOC detected Domain: this.md

extracted_from_files

Domain
detected Domain: n.re.no

XIOC detected Domain: n.re.no

extracted_from_files

Domain
detected Domain: g.open

XIOC detected Domain: g.open

extracted_from_files

Domain
detected Domain: u.open

XIOC detected Domain: u.open

extracted_from_files

Domain
detected Domain: g.info

XIOC detected Domain: g.info

extracted_from_files

Domain
detected Domain: h.info

XIOC detected Domain: h.info

extracted_from_files

Domain
detected Domain: u.info

XIOC detected Domain: u.info

extracted_from_files

Domain
detected Domain: e.info

XIOC detected Domain: e.info

extracted_from_files

Domain
detected Domain: this.re.link

XIOC detected Domain: this.re.link

extracted_from_files

Domain
detected Domain: this.re.host

XIOC detected Domain: this.re.host

extracted_from_files

Domain
detected Domain: e.search

XIOC detected Domain: e.search

extracted_from_files

Domain
detected Domain: this.re

XIOC detected Domain: this.re

extracted_from_files

Domain
detected Domain: t.re.host

XIOC detected Domain: t.re.host

extracted_from_files

Domain
detected Domain: e.link

XIOC detected Domain: e.link

extracted_from_files

Domain
detected Domain: e.email

XIOC detected Domain: e.email

extracted_from_files

Domain
detected Domain: n.topnodetype.name

XIOC detected Domain: n.topnodetype.name

extracted_from_files

Domain
detected Domain: inline.state.prototype.scandelims.call

XIOC detected Domain: inline.state.prototype.scandelims.call

extracted_from_files

Domain
detected Domain: s.open

XIOC detected Domain: s.open

extracted_from_files

Domain
detected Domain: w.type.name

XIOC detected Domain: w.type.name

extracted_from_files

Domain
detected Domain: l.type.name

XIOC detected Domain: l.type.name

extracted_from_files

Domain
detected Domain: t.info

XIOC detected Domain: t.info

extracted_from_files

Domain
detected Domain: this.re.email

XIOC detected Domain: this.re.email

extracted_from_files

Domain
detected Domain: ae.call

XIOC detected Domain: ae.call

extracted_from_files

Domain
detected Domain: pe.call

XIOC detected Domain: pe.call

extracted_from_files

Domain
detected Domain: j.call

XIOC detected Domain: j.call

extracted_from_files

Domain
detected Domain: i.open

XIOC detected Domain: i.open

extracted_from_files

Domain
detected Domain: f3.name

XIOC detected Domain: f3.name

extracted_from_files

Domain
detected Domain: vr.marks.link

XIOC detected Domain: vr.marks.link

extracted_from_files

Domain
detected Domain: fh.storage.markdown.serialize.call

XIOC detected Domain: fh.storage.markdown.serialize.call

extracted_from_files

Domain
detected Domain: t.off

XIOC detected Domain: t.off

extracted_from_files

Domain
detected Domain: this.editor.state.selection.to

XIOC detected Domain: this.editor.state.selection.to

extracted_from_files

Domain
detected Domain: t.open

XIOC detected Domain: t.open

extracted_from_files

Domain
detected Domain: t.items.map

XIOC detected Domain: t.items.map

extracted_from_files

Domain
detected Domain: b.to

XIOC detected Domain: b.to

extracted_from_files

Domain
detected Domain: c.range.to

XIOC detected Domain: c.range.to

extracted_from_files

Domain
detected Domain: n.call

XIOC detected Domain: n.call

extracted_from_files

Domain
detected Domain: g.media

XIOC detected Domain: g.media

extracted_from_files

Domain
detected Domain: g.as

XIOC detected Domain: g.as

extracted_from_files

Domain
detected Domain: p.now

XIOC detected Domain: p.now

extracted_from_files

Domain
detected Domain: m.now

XIOC detected Domain: m.now

extracted_from_files

Domain
detected Domain: j.id-x.id

XIOC detected Domain: j.id-x.id

extracted_from_files

Domain
detected Domain: te.call

XIOC detected Domain: te.call

extracted_from_files

Domain
detected Domain: r.id

XIOC detected Domain: r.id

extracted_from_files

Domain
detected Domain: he.call

XIOC detected Domain: he.call

extracted_from_files

Domain
detected Domain: cl.next

XIOC detected Domain: cl.next

extracted_from_files

Domain
detected Domain: t.id

XIOC detected Domain: t.id

extracted_from_files

Domain
detected Domain: t.target

XIOC detected Domain: t.target

extracted_from_files

Domain
detected Domain: i.call

XIOC detected Domain: i.call

extracted_from_files

Domain
detected Domain: a.call

XIOC detected Domain: a.call

extracted_from_files

Domain
detected Domain: ve.call

XIOC detected Domain: ve.call

extracted_from_files

Domain
detected Domain: l.data.map

XIOC detected Domain: l.data.map

extracted_from_files

Domain
detected Domain: jt.next

XIOC detected Domain: jt.next

extracted_from_files

Domain
detected Domain: i.events

XIOC detected Domain: i.events

extracted_from_files

Domain
detected Domain: pe.next

XIOC detected Domain: pe.next

extracted_from_files

Domain
detected Domain: z.next

XIOC detected Domain: z.next

extracted_from_files

Domain
detected Domain: ne.call

XIOC detected Domain: ne.call

extracted_from_files

Domain
detected Domain: n.next

XIOC detected Domain: n.next

extracted_from_files

Domain
detected Domain: i.id

XIOC detected Domain: i.id

extracted_from_files

Domain
detected Domain: y.memoizedprops.style

XIOC detected Domain: y.memoizedprops.style

extracted_from_files

Domain
detected Domain: n.property

XIOC detected Domain: n.property

extracted_from_files

Domain
detected Domain: e.events

XIOC detected Domain: e.events

extracted_from_files

Domain
detected Domain: l.is

XIOC detected Domain: l.is

extracted_from_files

Domain
detected Domain: n.compare

XIOC detected Domain: n.compare

extracted_from_files

Domain
detected Domain: t.events

XIOC detected Domain: t.events

extracted_from_files

Domain
detected Domain: n.media

XIOC detected Domain: n.media

extracted_from_files

Domain
detected Domain: l.data

XIOC detected Domain: l.data

extracted_from_files

Domain
detected Domain: de.data

XIOC detected Domain: de.data

extracted_from_files

Domain
detected Domain: be.target

XIOC detected Domain: be.target

extracted_from_files

Domain
detected Domain: w.target

XIOC detected Domain: w.target

extracted_from_files

Domain
detected Domain: ai.next

XIOC detected Domain: ai.next

extracted_from_files

Domain
detected Domain: d.top

XIOC detected Domain: d.top

extracted_from_files

Domain
detected Domain: this.tokenizer.space

XIOC detected Domain: this.tokenizer.space

extracted_from_files

Domain
detected Domain: ee.search

XIOC detected Domain: ee.search

extracted_from_files

Domain
detected Domain: this.lexer.state.top

XIOC detected Domain: this.lexer.state.top

extracted_from_files

Domain
detected Domain: u.shell

XIOC detected Domain: u.shell

extracted_from_files

Domain
detected Domain: cursor.com

XIOC detected Domain: cursor.com

extracted_from_files

Domain
detected Domain: wr.call

XIOC detected Domain: wr.call

extracted_from_files

Domain
detected Domain: l.media

XIOC detected Domain: l.media

extracted_from_files

Domain
detected Domain: c.link

XIOC detected Domain: c.link

extracted_from_files

Domain
detected Domain: this.renderer.hr

XIOC detected Domain: this.renderer.hr

extracted_from_files

Domain
detected Domain: this.renderer.space

XIOC detected Domain: this.renderer.space

extracted_from_files

Domain
detected Domain: this.tokenizer.br

XIOC detected Domain: this.tokenizer.br

extracted_from_files

Domain
detected Domain: this.tokenizer.link

XIOC detected Domain: this.tokenizer.link

extracted_from_files

Domain
detected Domain: this.state.top

XIOC detected Domain: this.state.top

extracted_from_files

Domain
detected Domain: this.tokenizer.hr

XIOC detected Domain: this.tokenizer.hr

extracted_from_files

Domain
detected Domain: ee.call

XIOC detected Domain: ee.call

extracted_from_files

Domain
detected Domain: ke.call

XIOC detected Domain: ke.call

extracted_from_files

Domain
detected Domain: s.in

XIOC detected Domain: s.in

extracted_from_files

Domain
detected Domain: s.safe

XIOC detected Domain: s.safe

extracted_from_files

Domain
detected Domain: p.call

XIOC detected Domain: p.call

extracted_from_files

Domain
detected Domain: c.call

XIOC detected Domain: c.call

extracted_from_files

Domain
detected Domain: c.br

XIOC detected Domain: c.br

extracted_from_files

Domain
detected Domain: u.style

XIOC detected Domain: u.style

extracted_from_files

Domain
detected Domain: c.map

XIOC detected Domain: c.map

extracted_from_files

Domain
detected Domain: jo.link

XIOC detected Domain: jo.link

extracted_from_files

Domain
detected Domain: q.ownerdocument.doctype.name

XIOC detected Domain: q.ownerdocument.doctype.name

extracted_from_files

Domain
detected Domain: lt.call

XIOC detected Domain: lt.call

extracted_from_files

Domain
detected Domain: f.call

XIOC detected Domain: f.call

extracted_from_files

Domain
detected Domain: g.show

XIOC detected Domain: g.show

extracted_from_files

Domain
detected Domain: ce.id

XIOC detected Domain: ce.id

extracted_from_files

Domain
detected Domain: yy.map

XIOC detected Domain: yy.map

extracted_from_files

Domain
detected Domain: g.agents.map

XIOC detected Domain: g.agents.map

extracted_from_files

Domain
detected Domain: j.map

XIOC detected Domain: j.map

extracted_from_files

Domain
detected Domain: le.map

XIOC detected Domain: le.map

extracted_from_files

Domain
detected Domain: b.data

XIOC detected Domain: b.data

extracted_from_files

Domain
detected Domain: u.context.map

XIOC detected Domain: u.context.map

extracted_from_files

Domain
detected Domain: dt.total

XIOC detected Domain: dt.total

extracted_from_files

Domain
detected Domain: ge.total

XIOC detected Domain: ge.total

extracted_from_files

Domain
detected Domain: z.map

XIOC detected Domain: z.map

extracted_from_files

Domain
detected Domain: y.id

XIOC detected Domain: y.id

extracted_from_files

Domain
detected Domain: nt.map

XIOC detected Domain: nt.map

extracted_from_files

Domain
detected Domain: ce.name

XIOC detected Domain: ce.name

extracted_from_files

Domain
detected Domain: me.id

XIOC detected Domain: me.id

extracted_from_files

Domain
detected Domain: swarmify.co

XIOC detected Domain: swarmify.co

extracted_from_files

Domain
detected Domain: kt.data

XIOC detected Domain: kt.data

extracted_from_files

Domain
detected Domain: g0.map

XIOC detected Domain: g0.map

extracted_from_files

Domain
detected Domain: h0.map

XIOC detected Domain: h0.map

extracted_from_files

Domain
detected Domain: oe.name

XIOC detected Domain: oe.name

extracted_from_files

Domain
detected Domain: st.name

XIOC detected Domain: st.name

extracted_from_files

Domain
detected Domain: bt.map

XIOC detected Domain: bt.map

extracted_from_files

Domain
detected Domain: terminal.show

XIOC detected Domain: terminal.show

extracted_from_files

Domain
detected Domain: message.data

XIOC detected Domain: message.data

extracted_from_files

Domain
detected Domain: contextfiles.js.map

XIOC detected Domain: contextfiles.js.map

extracted_from_files

Domain
detected Domain: entry.name

XIOC detected Domain: entry.name

extracted_from_files

Domain
detected Domain: claudemd.vscode.js.map

XIOC detected Domain: claudemd.vscode.js.map

extracted_from_files

Domain
detected Domain: agents.vscode.js.map

XIOC detected Domain: agents.vscode.js.map

extracted_from_files

Domain
detected Domain: agentlinks.vscode.js.map

XIOC detected Domain: agentlinks.vscode.js.map

extracted_from_files

Domain
detected Domain: custom.name

XIOC detected Domain: custom.name

extracted_from_files

Domain
detected Domain: quickpick.show

XIOC detected Domain: quickpick.show

extracted_from_files

Domain
detected Domain: p.id

XIOC detected Domain: p.id

extracted_from_files

Domain
detected Domain: sorted.map

XIOC detected Domain: sorted.map

extracted_from_files

Domain
detected Domain: terminal.name

XIOC detected Domain: terminal.name

extracted_from_files

Domain
detected Domain: swarmify-oauth.muqsitnawaz.workers.dev

XIOC detected Domain: swarmify-oauth.muqsitnawaz.workers.dev

extracted_from_files

Domain
detected Domain: customeditor.js.map

XIOC detected Domain: customeditor.js.map

extracted_from_files

Domain
detected Domain: aliases.map

XIOC detected Domain: aliases.map

extracted_from_files

Domain
detected Domain: agents.new

XIOC detected Domain: agents.new

extracted_from_files

Domain
detected Domain: vscode.configurationtarget.global

XIOC detected Domain: vscode.configurationtarget.global

extracted_from_files

Domain
detected Domain: agent.name

XIOC detected Domain: agent.name

extracted_from_files

Domain
detected Domain: agents.open

XIOC detected Domain: agents.open

extracted_from_files

Domain
detected Domain: entry.terminal.show

XIOC detected Domain: entry.terminal.show

extracted_from_files

Domain
detected Domain: agentstatusbaritem.show

XIOC detected Domain: agentstatusbaritem.show

extracted_from_files

Domain
detected Domain: selected.terminal.show

XIOC detected Domain: selected.terminal.show

extracted_from_files

Domain
detected Domain: previewpromises.map

XIOC detected Domain: previewpromises.map

extracted_from_files

Domain
detected Domain: tasks.map

XIOC detected Domain: tasks.map

extracted_from_files

Domain
detected Domain: vscode.window.terminals.map

XIOC detected Domain: vscode.window.terminals.map

extracted_from_files

Domain
detected Domain: entry.id

XIOC detected Domain: entry.id

extracted_from_files

Domain
detected Domain: agents.alias.fast

XIOC detected Domain: agents.alias.fast

extracted_from_files

Domain
detected Domain: alias.name

XIOC detected Domain: alias.name

extracted_from_files

Domain
detected Domain: github.vscode.js.map

XIOC detected Domain: github.vscode.js.map

extracted_from_files

Domain
detected Domain: git.vscode.js.map

XIOC detected Domain: git.vscode.js.map

extracted_from_files

Domain
detected Domain: allchangestostage.map

XIOC detected Domain: allchangestostage.map

extracted_from_files

Domain
detected Domain: filteredindexchanges.map

XIOC detected Domain: filteredindexchanges.map

extracted_from_files

Domain
detected Domain: filteredworkingtreechanges.map

XIOC detected Domain: filteredworkingtreechanges.map

extracted_from_files

Domain
detected Domain: extension.js.map

XIOC detected Domain: extension.js.map

extracted_from_files

Domain
detected Domain: tracked.map

XIOC detected Domain: tracked.map

extracted_from_files

Domain
detected Domain: ver.name

XIOC detected Domain: ver.name

extracted_from_files

Domain
detected Domain: candidates.map

XIOC detected Domain: candidates.map

extracted_from_files

Domain
detected Domain: obj.delta

XIOC detected Domain: obj.delta

extracted_from_files

Domain
detected Domain: prewarm.vscode.js.map

XIOC detected Domain: prewarm.vscode.js.map

extracted_from_files

Domain
detected Domain: pool.available.map

XIOC detected Domain: pool.available.map

extracted_from_files

Domain
detected Domain: notifications.vscode.js.map

XIOC detected Domain: notifications.vscode.js.map

extracted_from_files

Domain
detected Domain: linear.vscode.js.map

XIOC detected Domain: linear.vscode.js.map

extracted_from_files

Domain
detected Domain: settings.style

XIOC detected Domain: settings.style

extracted_from_files

Domain
detected Domain: stored.notifications.style

XIOC detected Domain: stored.notifications.style

extracted_from_files

Domain
detected Domain: g.mapping.map

XIOC detected Domain: g.mapping.map

extracted_from_files

URL
detected URL: http://tmux.sourceforge.net/)

XIOC detected URL: http://tmux.sourceforge.net/)

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

Hash
detected SHA1 Hash: bde8922e08c3638e01ecc7b581b676c314163e3c

XIOC detected SHA1 Hash: bde8922e08c3638e01ecc7b581b676c314163e3c

extracted_from_files

Hash
detected SHA1 Hash: 1def5774632305246fe21f0f69e23a664d6c5910

XIOC detected SHA1 Hash: 1def5774632305246fe21f0f69e23a664d6c5910

extracted_from_files

Hash
detected MD5 Hash: ff00ff00ff00ff00ff00ff00ff00ff00

XIOC detected MD5 Hash: ff00ff00ff00ff00ff00ff00ff00ff00

extracted_from_files

Hash
detected MD5 Hash: 0123456789ABCDEF0123456789abcdef

XIOC detected MD5 Hash: 0123456789ABCDEF0123456789abcdef

extracted_from_files

Hash
detected SHA1 Hash: 06b29aafb7708acef8b3669835c8a7857ebc92d2

XIOC detected SHA1 Hash: 06b29aafb7708acef8b3669835c8a7857ebc92d2

extracted_from_files

Hash
detected SHA1 Hash: b4db322010d2d897e6c496fefc4f0ecc9b84c2f3

XIOC detected SHA1 Hash: b4db322010d2d897e6c496fefc4f0ecc9b84c2f3

extracted_from_files

Hash
detected SHA1 Hash: 67a34b6c03557a5c2e0a2bdd502c2210921d8f3e

XIOC detected SHA1 Hash: 67a34b6c03557a5c2e0a2bdd502c2210921d8f3e

extracted_from_files

Hash
detected SHA1 Hash: 880c00c69eeca73643ddb576f02c5badbec81f56

XIOC detected SHA1 Hash: 880c00c69eeca73643ddb576f02c5badbec81f56

extracted_from_files

Hash
detected SHA1 Hash: ec3eae8df5bbbb36d7628d168b0815638d122f37

XIOC detected SHA1 Hash: ec3eae8df5bbbb36d7628d168b0815638d122f37

extracted_from_files

Hash
detected MD5 Hash: 7fffffffffffffff7fffffffffffffff

XIOC detected MD5 Hash: 7fffffffffffffff7fffffffffffffff

extracted_from_files

Hash
detected MD5 Hash: ffffffffffffffffffffffffffffffff

XIOC detected MD5 Hash: ffffffffffffffffffffffffffffffff

extracted_from_files

Hash
detected MD5 Hash: 00000000000000070000000000000000

XIOC detected MD5 Hash: 00000000000000070000000000000000

extracted_from_files

Hash
detected MD5 Hash: 5f5e5d5c5b5a59585756555453525150

XIOC detected MD5 Hash: 5f5e5d5c5b5a59585756555453525150

extracted_from_files

Hash
detected MD5 Hash: 4f4e4d4c4b4a49484746454443424140

XIOC detected MD5 Hash: 4f4e4d4c4b4a49484746454443424140

extracted_from_files

Hash
detected MD5 Hash: 000000000000000f0000000000000004

XIOC detected MD5 Hash: 000000000000000f0000000000000004

extracted_from_files

Hash
detected MD5 Hash: 000000000000001f0000000000000010

XIOC detected MD5 Hash: 000000000000001f0000000000000010

extracted_from_files

Hash
detected MD5 Hash: 8dd8ca134b39534b7da2733994aa07ba

XIOC detected MD5 Hash: 8dd8ca134b39534b7da2733994aa07ba

extracted_from_files

Hash
detected MD5 Hash: c8ff7688dc7895aa34dacdd81a00ac00

XIOC detected MD5 Hash: c8ff7688dc7895aa34dacdd81a00ac00

extracted_from_files

Hash
detected MD5 Hash: a0d2fee425b55d4f5d1a29b713a84f11

XIOC detected MD5 Hash: a0d2fee425b55d4f5d1a29b713a84f11

extracted_from_files

Hash
detected MD5 Hash: b28cccc7a637a056a02bdeb7899c10a7

XIOC detected MD5 Hash: b28cccc7a637a056a02bdeb7899c10a7

extracted_from_files

Hash
detected MD5 Hash: 685fe6d7d50b53c600f8d9fea7bcde94

XIOC detected MD5 Hash: 685fe6d7d50b53c600f8d9fea7bcde94

extracted_from_files

Hash
detected MD5 Hash: 80000000000000008000000000000000

XIOC detected MD5 Hash: 80000000000000008000000000000000

extracted_from_files

Hash
detected MD5 Hash: 000000000000000f0000000000000000

XIOC detected MD5 Hash: 000000000000000f0000000000000000

extracted_from_files

URL
detected URL: http://schemas.microsoft.com/developer/vsx-schema-design/2011

XIOC detected URL: http://schemas.microsoft.com/developer/vsx-schema-design/2011

extracted_from_files

URL
detected URL: https://github.com/muqsitnawaz/swarmify.git

XIOC detected URL: https://github.com/muqsitnawaz/swarmify.git

extracted_from_files

URL
detected URL: https://github.com/muqsitnawaz/swarmify/issues

XIOC detected URL: https://github.com/muqsitnawaz/swarmify/issues

extracted_from_files

URL
detected URL: https://swarmify.co/#agents-ext

XIOC detected URL: https://swarmify.co/#agents-ext

extracted_from_files

Hash
detected SHA256 Hash: 0000001f0000001f0000001f0000001f0000001f0000001f0000001f0000001f

XIOC detected SHA256 Hash: 0000001f0000001f0000001f0000001f0000001f0000001f0000001f0000001f

extracted_from_files

Hash
detected SHA256 Hash: ffffff00ffffff00ffffff00ffffff00ffffff00ffffff00ffffff00ffffff00

XIOC detected SHA256 Hash: ffffff00ffffff00ffffff00ffffff00ffffff00ffffff00ffffff00ffffff00

extracted_from_files

Hash
detected SHA256 Hash: 873d4e274b4988d260ba8354a9718324a1c26187a4ab4c1cc0227c03d0f10e70

XIOC detected SHA256 Hash: 873d4e274b4988d260ba8354a9718324a1c26187a4ab4c1cc0227c03d0f10e70

extracted_from_files

URL
detected URL: https://github.com/muqsitnawaz/swarmify

XIOC detected URL: https://github.com/muqsitnawaz/swarmify

extracted_from_files

URL
detected URL: https://marketplace.visualstudio.com/items?itemName=swarmify.swarm-ext

XIOC detected URL: https://marketplace.visualstudio.com/items?itemName=swarmify.swarm-ext

extracted_from_files

URL
detected URL: https://www.npmjs.com/package/@swarmify/agents-mcp)

XIOC detected URL: https://www.npmjs.com/package/@swarmify/agents-mcp)

extracted_from_files

URL
detected URL: https://www.npmjs.com/package/@swarmify/agents-cli)

XIOC detected URL: https://www.npmjs.com/package/@swarmify/agents-cli)

extracted_from_files

URL
detected URL: http://schemas.microsoft.com/developer/vsx-schema/2011

XIOC detected URL: http://schemas.microsoft.com/developer/vsx-schema/2011

extracted_from_files

URL
detected URL: https://swarmify-oauth.muqsitnawaz.workers.dev/oauth/exchange',

XIOC detected URL: https://swarmify-oauth.muqsitnawaz.workers.dev/oauth/exchange',

extracted_from_files

URL
detected URL: https://api.openai.com/v1/responses',

XIOC detected URL: https://api.openai.com/v1/responses',

extracted_from_files

URL
detected URL: https://github.com/user/repo.git

XIOC detected URL: https://github.com/user/repo.git

extracted_from_files

URL
detected URL: https://github.com/user/repo

XIOC detected URL: https://github.com/user/repo

extracted_from_files

URL
detected URL: https://github.com/login/oauth/authorize?client_id=$

XIOC detected URL: https://github.com/login/oauth/authorize?client_id=$

extracted_from_files

URL
detected URL: https://linear.app/oauth/authorize?client_id=$

XIOC detected URL: https://linear.app/oauth/authorize?client_id=$

extracted_from_files

URL
detected URL: https://github.com/muqsitnawaz/swarmify'));

XIOC detected URL: https://github.com/muqsitnawaz/swarmify'));

extracted_from_files

URL
detected URL: https://github.com/markedjs/marked.

XIOC detected URL: https://github.com/markedjs/marked.

extracted_from_files

URL
detected URL: http://www.w3.org/1998/Math/MathML

XIOC detected URL: http://www.w3.org/1998/Math/MathML

extracted_from_files

URL
detected URL: http://www.w3.org/1999/xhtml

XIOC detected URL: http://www.w3.org/1999/xhtml

extracted_from_files

URL
detected URL: https://github.com/$

XIOC detected URL: https://github.com/$

extracted_from_files

URL
detected URL: https://swarmify.co

XIOC detected URL: https://swarmify.co

extracted_from_files

URL
detected URL: https://react.dev/errors/

XIOC detected URL: https://react.dev/errors/

extracted_from_files

URL
detected URL: http://www.w3.org/2000/svg

XIOC detected URL: http://www.w3.org/2000/svg

extracted_from_files

URL
detected URL: http://www.w3.org/1999/xlink

XIOC detected URL: http://www.w3.org/1999/xlink

extracted_from_files

URL
detected URL: https://github.com/google-gemini/gemini-cli

XIOC detected URL: https://github.com/google-gemini/gemini-cli

extracted_from_files

URL
detected URL: https://github.com/highlightjs/highlight.js/issues/2277

XIOC detected URL: https://github.com/highlightjs/highlight.js/issues/2277

extracted_from_files

URL
detected URL: https://github.com/highlightjs/highlight.js/wiki/security

XIOC detected URL: https://github.com/highlightjs/highlight.js/wiki/security

extracted_from_files

URL
detected URL: http://

XIOC detected URL: http://

extracted_from_files

URL
detected URL: https://prosemirror.net/docs/guide/#generatable)

XIOC detected URL: https://prosemirror.net/docs/guide/#generatable)

extracted_from_files

URL
detected URL: https://www.youtube-nocookie.com/embed/videoseries?list=

XIOC detected URL: https://www.youtube-nocookie.com/embed/videoseries?list=

extracted_from_files

URL
detected URL: https://linear.app/oauth/authorize');

XIOC detected URL: https://linear.app/oauth/authorize');

extracted_from_files

Domain
detected Domain: fs.watch

XIOC detected Domain: fs.watch

extracted_from_files

URL
detected URL: https://github.com/eemeli/yaml/issues/228

XIOC detected URL: https://github.com/eemeli/yaml/issues/228

extracted_from_files

URL
detected URL: https://developer.mozilla.org/en/docs/Web/JavaScript/Reference/Global_Objects/BigInt

XIOC detected URL: https://developer.mozilla.org/en/docs/Web/JavaScript/Reference/Global_Objects/BigInt

extracted_from_files

URL
detected URL: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/JSON/parse#using_the_reviver_parameter

XIOC detected URL: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/JSON/parse#using_the_reviver_parameter

extracted_from_files

URL
detected URL: https://github.com/sponsors/eemeli

XIOC detected URL: https://github.com/sponsors/eemeli

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/

XIOC detected URL: https://eemeli.org/yaml/

extracted_from_files

URL
detected URL: https://api.openai.com/v1/chat/completions';

XIOC detected URL: https://api.openai.com/v1/chat/completions';

extracted_from_files

URL
detected URL: https://openrouter.ai/api/v1/chat/completions';

XIOC detected URL: https://openrouter.ai/api/v1/chat/completions';

extracted_from_files

URL
detected URL: https://www.npmjs.com/package/yaml'

XIOC detected URL: https://www.npmjs.com/package/yaml'

extracted_from_files

URL
detected URL: https://www.browserstack.com/open-source

XIOC detected URL: https://www.browserstack.com/open-source

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/images/browserstack.svg

XIOC detected URL: https://eemeli.org/yaml/images/browserstack.svg

extracted_from_files

URL
detected URL: https://caniuse.com/js-regexp-lookbehind

XIOC detected URL: https://caniuse.com/js-regexp-lookbehind

extracted_from_files

URL
detected URL: https://tc39.es/ecma262/#sec-json.parse

XIOC detected URL: https://tc39.es/ecma262/#sec-json.parse

extracted_from_files

URL
detected URL: https://tc39.es/ecma262/#sec-serializejsonproperty

XIOC detected URL: https://tc39.es/ecma262/#sec-serializejsonproperty

extracted_from_files

URL
detected URL: http://yaml.org/type/merge.html

XIOC detected URL: http://yaml.org/type/merge.html

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/#finding-and-modifying-nodes)

XIOC detected URL: https://eemeli.org/yaml/#finding-and-modifying-nodes)

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/#lexer)

XIOC detected URL: https://eemeli.org/yaml/#lexer)

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/#parser)

XIOC detected URL: https://eemeli.org/yaml/#parser)

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/#composer)

XIOC detected URL: https://eemeli.org/yaml/#composer)

extracted_from_files

URL
detected URL: https://en.wikipedia.org/wiki/YAML

XIOC detected URL: https://en.wikipedia.org/wiki/YAML

extracted_from_files

URL
detected URL: https://www.npmjs.com/package/yaml

XIOC detected URL: https://www.npmjs.com/package/yaml

extracted_from_files

URL
detected URL: https://en.wikipedia.org/wiki/YAML'

XIOC detected URL: https://en.wikipedia.org/wiki/YAML'

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/#stream-directives)

XIOC detected URL: https://eemeli.org/yaml/#stream-directives)

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/#errors)

XIOC detected URL: https://eemeli.org/yaml/#errors)

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/#identifying-node-types)

XIOC detected URL: https://eemeli.org/yaml/#identifying-node-types)

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/#parsing-documents)

XIOC detected URL: https://eemeli.org/yaml/#parsing-documents)

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/#scalar-values)

XIOC detected URL: https://eemeli.org/yaml/#scalar-values)

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/#collections)

XIOC detected URL: https://eemeli.org/yaml/#collections)

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/#creating-nodes)

XIOC detected URL: https://eemeli.org/yaml/#creating-nodes)

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/#content-nodes),

XIOC detected URL: https://eemeli.org/yaml/#content-nodes),

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/#command-line-tool)

XIOC detected URL: https://eemeli.org/yaml/#command-line-tool)

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/#yaml-parse)

XIOC detected URL: https://eemeli.org/yaml/#yaml-parse)

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/#yaml-stringify)

XIOC detected URL: https://eemeli.org/yaml/#yaml-stringify)

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/#documents)

XIOC detected URL: https://eemeli.org/yaml/#documents)

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/#creating-documents)

XIOC detected URL: https://eemeli.org/yaml/#creating-documents)

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/#content-nodes)

XIOC detected URL: https://eemeli.org/yaml/#content-nodes)

extracted_from_files

URL
detected URL: https://github.com/eemeli/yaml/).

XIOC detected URL: https://github.com/eemeli/yaml/).

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/)

XIOC detected URL: https://eemeli.org/yaml/)

extracted_from_files

URL
detected URL: https://github.com/eemeli/yaml/tree/v1.10.0)

XIOC detected URL: https://github.com/eemeli/yaml/tree/v1.10.0)

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/v1/)

XIOC detected URL: https://eemeli.org/yaml/v1/)

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/#parse-amp-stringify),

XIOC detected URL: https://eemeli.org/yaml/#parse-amp-stringify),

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/#documents),

XIOC detected URL: https://eemeli.org/yaml/#documents),

extracted_from_files

URL
detected URL: https://eemeli.org/yaml/#parsing-yaml).

XIOC detected URL: https://eemeli.org/yaml/#parsing-yaml).

extracted_from_files

URL
detected URL: http://github.com/sql-js/sql.js

XIOC detected URL: http://github.com/sql-js/sql.js

extracted_from_files

URL
detected URL: http://github.com/sql-js/sql.js.git

XIOC detected URL: http://github.com/sql-js/sql.js.git

extracted_from_files

URL
detected URL: https://github.com/sql-js/sql.js/issues

XIOC detected URL: https://github.com/sql-js/sql.js/issues

extracted_from_files

URL
detected URL: https://badge.fury.io/js/yaml.svg

XIOC detected URL: https://badge.fury.io/js/yaml.svg

extracted_from_files

URL
detected URL: https://yaml.org/),

XIOC detected URL: https://yaml.org/),

extracted_from_files

URL
detected URL: https://github.com/yaml/yaml-test-suite)

XIOC detected URL: https://github.com/yaml/yaml-test-suite)

extracted_from_files

URL
detected URL: https://github.com/nodejs/help/issues/2136#issuecomment-523649904

XIOC detected URL: https://github.com/nodejs/help/issues/2136#issuecomment-523649904

extracted_from_files

URL
detected URL: https://github.com/emscripten-core/emscripten/pull/1555

XIOC detected URL: https://github.com/emscripten-core/emscripten/pull/1555

extracted_from_files

URL
detected URL: https://github.com/emscripten-core/emscripten/issues/23697

XIOC detected URL: https://github.com/emscripten-core/emscripten/issues/23697

extracted_from_files

URL
detected URL: http://pubs.opengroup.org/onlinepubs/009695399/functions/tzset.html

XIOC detected URL: http://pubs.opengroup.org/onlinepubs/009695399/functions/tzset.html

extracted_from_files

URL
detected URL: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Date/getTimezoneOffset

XIOC detected URL: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/Date/getTimezoneOffset

extracted_from_files

URL
detected URL: https://sql.js.org/)

XIOC detected URL: https://sql.js.org/)

extracted_from_files

URL
detected URL: https://emscripten.org/docs/getting_started/FAQ.html#how-do-i-run-a-local-webserver-for-testing-why-does-my-program-stall-in-downloading-or-preparing

XIOC detected URL: https://emscripten.org/docs/getting_started/FAQ.html#how-do-i-run-a-local-webserver-for-testing-why-does-my-program-stall-in-downloading-or-preparing

extracted_from_files

URL
detected URL: https://github.com/emscripten-core/emscripten/pull/16917

XIOC detected URL: https://github.com/emscripten-core/emscripten/pull/16917

extracted_from_files

URL
detected URL: https://github.com/google/closure-compiler/issues/3193,

XIOC detected URL: https://github.com/google/closure-compiler/issues/3193,

extracted_from_files

URL
detected URL: http://en.wikipedia.org/wiki/UTF-8#Description

XIOC detected URL: http://en.wikipedia.org/wiki/UTF-8#Description

extracted_from_files

URL
detected URL: https://www.ietf.org/rfc/rfc2279.txt

XIOC detected URL: https://www.ietf.org/rfc/rfc2279.txt

extracted_from_files

URL
detected URL: https://tools.ietf.org/html/rfc3629

XIOC detected URL: https://tools.ietf.org/html/rfc3629

extracted_from_files

URL
detected URL: http://unicode.org/faq/utf_bom.html#utf16-3

XIOC detected URL: http://unicode.org/faq/utf_bom.html#utf16-3

extracted_from_files

URL
detected URL: http://www.sqlite.org/lang_expr.html#varparam

XIOC detected URL: http://www.sqlite.org/lang_expr.html#varparam

extracted_from_files

URL
detected URL: https://sqlite.org/c3ref/expanded_sql.html

XIOC detected URL: https://sqlite.org/c3ref/expanded_sql.html

extracted_from_files

URL
detected URL: http://www.sqlite.org/c3ref/create_function.html

XIOC detected URL: http://www.sqlite.org/c3ref/create_function.html

extracted_from_files

URL
detected URL: http://site.com/etc/etc

XIOC detected URL: http://site.com/etc/etc

extracted_from_files

URL
detected URL: https://github.com/github/fetch/pull/92#issuecomment-140665932

XIOC detected URL: https://github.com/github/fetch/pull/92#issuecomment-140665932

extracted_from_files

URL
detected URL: http://kripken.github.io/emscripten-site/docs/api_reference/preamble.js.html

XIOC detected URL: http://kripken.github.io/emscripten-site/docs/api_reference/preamble.js.html

extracted_from_files

URL
detected URL: https://github.com/google/closure-compiler/pull/3913):

XIOC detected URL: https://github.com/google/closure-compiler/pull/3913):

extracted_from_files

URL
detected URL: https://github.com/sql-js/sql.js/releases/latest.

XIOC detected URL: https://github.com/sql-js/sql.js/releases/latest.

extracted_from_files

URL
detected URL: https://github.com/sql-js/sql.js/releases/),

XIOC detected URL: https://github.com/sql-js/sql.js/releases/),

extracted_from_files

URL
detected URL: https://github.com/kripken/emscripten/issues/5820

XIOC detected URL: https://github.com/kripken/emscripten/issues/5820

extracted_from_files

URL
detected URL: https://emscripten.org/docs/api_reference/module.html

XIOC detected URL: https://emscripten.org/docs/api_reference/module.html

extracted_from_files

URL
detected URL: https://www.sqlite.org/c3ref/aggregate_context.html

XIOC detected URL: https://www.sqlite.org/c3ref/aggregate_context.html

extracted_from_files

URL
detected URL: https://en.wikipedia.org/wiki/Prepared_statement

XIOC detected URL: https://en.wikipedia.org/wiki/Prepared_statement

extracted_from_files

URL
detected URL: http://www.sqlite.org/datatype3.html

XIOC detected URL: http://www.sqlite.org/datatype3.html

extracted_from_files

URL
detected URL: https://sql-js.github.io/sql.js/examples/GUI/gui.js

XIOC detected URL: https://sql-js.github.io/sql.js/examples/GUI/gui.js

extracted_from_files

URL
detected URL: https://github.com/lerocha/chinook-database/raw/master/ChinookDatabase/DataSources/Chinook_Sqlite.sqlite

XIOC detected URL: https://github.com/lerocha/chinook-database/raw/master/ChinookDatabase/DataSources/Chinook_Sqlite.sqlite

extracted_from_files

Domain
detected Domain: u.spec.appendtransaction.call

XIOC detected Domain: u.spec.appendtransaction.call

extracted_from_files

URL
detected URL: https://www.npmjs.org/package/sql.js).

XIOC detected URL: https://www.npmjs.org/package/sql.js).

extracted_from_files

URL
detected URL: https://github.com/sql-js/sql.js/blob/master/test/test_node_file.js

XIOC detected URL: https://github.com/sql-js/sql.js/blob/master/test/test_node_file.js

extracted_from_files

URL
detected URL: https://github.com/sql-js/sql.js/releases).

XIOC detected URL: https://github.com/sql-js/sql.js/releases).

extracted_from_files

URL
detected URL: https://github.com/sql-js/sql.js/releases)

XIOC detected URL: https://github.com/sql-js/sql.js/releases)

extracted_from_files

URL
detected URL: https://developer.mozilla.org/en-US/docs/WebAssembly),

XIOC detected URL: https://developer.mozilla.org/en-US/docs/WebAssembly),

extracted_from_files

URL
detected URL: https://cdnjs.com/libraries/sql.js).

XIOC detected URL: https://cdnjs.com/libraries/sql.js).

extracted_from_files

URL
detected URL: https://emscripten.org/docs/api_reference/module.html#Module.locateFile)

XIOC detected URL: https://emscripten.org/docs/api_reference/module.html#Module.locateFile)

extracted_from_files

URL
detected URL: https://github.com/sql-js/react-sqljs-demo).

XIOC detected URL: https://github.com/sql-js/react-sqljs-demo).

extracted_from_files

URL
detected URL: https://sql.js.org/dist/$

XIOC detected URL: https://sql.js.org/dist/$

extracted_from_files

URL
detected URL: https://sql-js.github.io/sql.js/index.html).

XIOC detected URL: https://sql-js.github.io/sql.js/index.html).

extracted_from_files

URL
detected URL: https://sql-js.github.io/sql.js/examples/GUI/index.html).

XIOC detected URL: https://sql-js.github.io/sql.js/examples/GUI/index.html).

extracted_from_files

URL
detected URL: https://emscripten.org/docs/porting/files/file_systems_overview.html),

XIOC detected URL: https://emscripten.org/docs/porting/files/file_systems_overview.html),

extracted_from_files

URL
detected URL: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Typed_arrays).

XIOC detected URL: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Typed_arrays).

extracted_from_files

URL
detected URL: https://emscripten.org/docs/introducing_emscripten/about_emscripten.html)

XIOC detected URL: https://emscripten.org/docs/introducing_emscripten/about_emscripten.html)

extracted_from_files

URL
detected URL: http://sqlite.org/about.html)

XIOC detected URL: http://sqlite.org/about.html)

extracted_from_files

URL
detected URL: https://www.sqlite.org/contrib?orderby=date).

XIOC detected URL: https://www.sqlite.org/contrib?orderby=date).

extracted_from_files

URL
detected URL: https://www.npmjs.com/package/sqlite3).

XIOC detected URL: https://www.npmjs.com/package/sqlite3).

extracted_from_files

URL
detected URL: https://sql.js.org/documentation/)

XIOC detected URL: https://sql.js.org/documentation/)

extracted_from_files

URL
detected URL: https://marketplace.visualstudio.com/items?itemName=ms-vscode-remote.vscode-remote-extensionpack)

XIOC detected URL: https://marketplace.visualstudio.com/items?itemName=ms-vscode-remote.vscode-remote-extensionpack)

extracted_from_files

URL
detected URL: https://emscripten.org/docs/getting_started/downloads.html)

XIOC detected URL: https://emscripten.org/docs/getting_started/downloads.html)

extracted_from_files

URL
detected URL: https://user-images.githubusercontent.com/552629/76405509-87025300-6388-11ea-86c9-af882abb00bd.png

XIOC detected URL: https://user-images.githubusercontent.com/552629/76405509-87025300-6388-11ea-86c9-af882abb00bd.png

extracted_from_files

URL
detected URL: https://github.com/sql-js/sql.js/workflows/CI/badge.svg)](https://github.com/sql-js/sql.js/actions)

XIOC detected URL: https://github.com/sql-js/sql.js/workflows/CI/badge.svg)](https://github.com/sql-js/sql.js/actions)

extracted_from_files

URL
detected URL: https://img.shields.io/npm/v/sql.js)](https://www.npmjs.com/package/sql.js)

XIOC detected URL: https://img.shields.io/npm/v/sql.js)](https://www.npmjs.com/package/sql.js)

extracted_from_files

URL
detected URL: https://img.shields.io/cdnjs/v/sql.js.svg)](https://cdnjs.com/libraries/sql.js)

XIOC detected URL: https://img.shields.io/cdnjs/v/sql.js.svg)](https://cdnjs.com/libraries/sql.js)

extracted_from_files

URL
detected URL: https://sql.js.org/examples/GUI/).

XIOC detected URL: https://sql.js.org/examples/GUI/).

extracted_from_files

URL
detected URL: https://aka.ms/vscode-remote/containers/non-root.

XIOC detected URL: https://aka.ms/vscode-remote/containers/non-root.

extracted_from_files

URL
detected URL: https://sql.js.org/

XIOC detected URL: https://sql.js.org/

extracted_from_files

URL
detected URL: https://github.com/sql-js/sql.js

XIOC detected URL: https://github.com/sql-js/sql.js

extracted_from_files

URL
detected URL: https://sql.js.org/examples/GUI/

XIOC detected URL: https://sql.js.org/examples/GUI/

extracted_from_files

URL
detected URL: https://github.com/lovasoa)

XIOC detected URL: https://github.com/lovasoa)

extracted_from_files

URL
detected URL: https://github.com/lukebarnard1/nomad-term)

XIOC detected URL: https://github.com/lukebarnard1/nomad-term)

extracted_from_files

URL
detected URL: http://www.gnu.org/software/gnulib/manual/html_node/forkpty.html

XIOC detected URL: http://www.gnu.org/software/gnulib/manual/html_node/forkpty.html

extracted_from_files

Domain
detected Domain: theme.vscode.js.map

XIOC detected Domain: theme.vscode.js.map

extracted_from_files

Domain
detected Domain: terminals.vscode.js.map

XIOC detected Domain: terminals.vscode.js.map

extracted_from_files

Domain
detected Domain: sessionpromises.map

XIOC detected Domain: sessionpromises.map

extracted_from_files

Domain
detected Domain: entry.pid

XIOC detected Domain: entry.pid

extracted_from_files

Domain
detected Domain: microsoft.visualstudio.services.links.support

XIOC detected Domain: microsoft.visualstudio.services.links.support

extracted_from_files

Domain
detected Domain: lowercase.md

XIOC detected Domain: lowercase.md

extracted_from_files

Domain
detected Domain: uppercase.md

XIOC detected Domain: uppercase.md

extracted_from_files

IP
detected Domain: ci-pipeline.md

XIOC detected Domain: ci-pipeline.md

extracted_from_files

Domain
detected Domain: auth-feature.md

XIOC detected Domain: auth-feature.md

extracted_from_files

Domain
detected Domain: claudesessions.map

XIOC detected Domain: claudesessions.map

extracted_from_files

Domain
detected Domain: retrieved.map

XIOC detected Domain: retrieved.map

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

Domain
detected Domain: tmux.js.map

XIOC detected Domain: tmux.js.map

extracted_from_files

URL
detected URL: http://extraterm.org/)

XIOC detected URL: http://extraterm.org/)

extracted_from_files

URL
detected URL: https://github.com/electerm/electerm)

XIOC detected URL: https://github.com/electerm/electerm)

extracted_from_files

URL
detected URL: https://atom.io/packages/atom-xterm)

XIOC detected URL: https://atom.io/packages/atom-xterm)

extracted_from_files

URL
detected URL: https://atom.io/packages/termination)

XIOC detected URL: https://atom.io/packages/termination)

extracted_from_files

URL
detected URL: https://atom.io/packages/x-terminal)

XIOC detected URL: https://atom.io/packages/x-terminal)

extracted_from_files

URL
detected URL: https://atom.io/packages/terminus)

XIOC detected URL: https://atom.io/packages/terminus)

extracted_from_files

URL
detected URL: https://github.com/matthew-matvei/freeman)

XIOC detected URL: https://github.com/matthew-matvei/freeman)

extracted_from_files

URL
detected URL: https://github.com/NuSkooler/enigma-bbs):

XIOC detected URL: https://github.com/NuSkooler/enigma-bbs):

extracted_from_files

URL
detected URL: https://github.com/CyanSalt/commas):

XIOC detected URL: https://github.com/CyanSalt/commas):

extracted_from_files

URL
detected URL: https://github.com/criteo/mesos-term):

XIOC detected URL: https://github.com/criteo/mesos-term):

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

URL
detected URL: https://github.com/sfx101/docker-stacks)

XIOC detected URL: https://github.com/sfx101/docker-stacks)

extracted_from_files

URL
detected URL: https://github.com/akshaykmr/TeleType):

XIOC detected URL: https://github.com/akshaykmr/TeleType):

extracted_from_files

Domain
detected Domain: todos.vscode.js.map

XIOC detected Domain: todos.vscode.js.map

extracted_from_files

URL
detected URL: https://github.com/tinkerun/tinkerun):

XIOC detected URL: https://github.com/tinkerun/tinkerun):

extracted_from_files

URL
detected URL: https://nxshell.github.io/):

XIOC detected URL: https://nxshell.github.io/):

extracted_from_files

Domain
detected Domain: ma.ua

XIOC detected Domain: ma.ua

extracted_from_files

URL
detected URL: http://schemas.openxmlformats.org/package/2006/content-types

XIOC detected URL: http://schemas.openxmlformats.org/package/2006/content-types

extracted_from_files

URL
detected URL: https://github.com/vjeantet/alerter.

XIOC detected URL: https://github.com/vjeantet/alerter.

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

Domain
detected Domain: l.free

XIOC detected Domain: l.free

extracted_from_files

URL
detected URL: http://www.apple.com/DTDs/PropertyList-1.0.dtd

XIOC detected URL: http://www.apple.com/DTDs/PropertyList-1.0.dtd

extracted_from_files

URL
detected URL: https://blogs.msdn.microsoft.com/commandline/2018/08/02/windows-command-line-introducing-the-windows-pseudo-console-conpty/)

XIOC detected URL: https://blogs.msdn.microsoft.com/commandline/2018/08/02/windows-command-line-introducing-the-windows-pseudo-console-conpty/)

extracted_from_files

URL
detected URL: http://ocsp.apple.com/ocsp03-applerootca0.

XIOC detected URL: http://ocsp.apple.com/ocsp03-applerootca0.

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty)

XIOC detected URL: https://github.com/rprichard/winpty)

extracted_from_files

URL
detected URL: https://www.apple.com/appleca/0

XIOC detected URL: https://www.apple.com/appleca/0

extracted_from_files

URL
detected URL: http://certs.apple.com/wwdrg3.der01

XIOC detected URL: http://certs.apple.com/wwdrg3.der01

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

URL
detected URL: https://dev.azure.com/vscode/node-pty/_apis/build/status/Microsoft.node-pty?branchName=main)](https://dev.azure.com/vscode/node-pty/_build/latest?definitionId=11&branchName=main)

XIOC detected URL: https://dev.azure.com/vscode/node-pty/_apis/build/status/Microsoft.node-pty?branchName=main)](https://dev.azure.com/vscode/node-pty/_build/latest?definitionId=11&branchName=main)

extracted_from_files

URL
detected URL: https://github.com/sql-js/sql.js/wiki/Load-a-database-from-the-server

XIOC detected URL: https://github.com/sql-js/sql.js/wiki/Load-a-database-from-the-server

extracted_from_files

URL
detected URL: https://code.visualstudio.com/docs/remote/containers#_installation).

XIOC detected URL: https://code.visualstudio.com/docs/remote/containers#_installation).

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

URL
detected URL: https://github.com/huangcs427/enjoy-git-release):

XIOC detected URL: https://github.com/huangcs427/enjoy-git-release):

extracted_from_files

URL
detected URL: https://github.com/chjj/)

XIOC detected URL: https://github.com/chjj/)

extracted_from_files

URL
detected URL: https://github.com/electron/node-gyp.git#06b29aafb7708acef8b3669835c8a7857ebc92d2

XIOC detected URL: https://github.com/electron/node-gyp.git#06b29aafb7708acef8b3669835c8a7857ebc92d2

extracted_from_files

URL
detected URL: https://www.apple.com/certificateauthority/0

XIOC detected URL: https://www.apple.com/certificateauthority/0

extracted_from_files

URL
detected URL: https://github.com/theia-ide/theia)

XIOC detected URL: https://github.com/theia-ide/theia)

extracted_from_files

URL
detected URL: https://github.com/ioquatix/script-runner)

XIOC detected URL: https://github.com/ioquatix/script-runner)

extracted_from_files

URL
detected URL: https://github.com/railsware/upterm)

XIOC detected URL: https://github.com/railsware/upterm)

extracted_from_files

URL
detected URL: https://hyper.is/)

XIOC detected URL: https://hyper.is/)

extracted_from_files

URL
detected URL: https://code.visualstudio.com)

XIOC detected URL: https://code.visualstudio.com)

extracted_from_files

URL
detected URL: https://github.com/microsoft/node-pty/blob/main/typings/node-pty.d.ts),

XIOC detected URL: https://github.com/microsoft/node-pty/blob/main/typings/node-pty.d.ts),

extracted_from_files

URL
detected URL: http://www.growingwiththeweb.com)

XIOC detected URL: http://www.growingwiththeweb.com)

extracted_from_files

URL
detected URL: https://github.com/opensumi/core):

XIOC detected URL: https://github.com/opensumi/core):

extracted_from_files

URL
detected URL: https://github.com/microsoft/node-pty/issues/557#issuecomment-1332193541).

XIOC detected URL: https://github.com/microsoft/node-pty/issues/557#issuecomment-1332193541).

extracted_from_files

URL
detected URL: https://github.com/Tyriar/node-pty/pulls)

XIOC detected URL: https://github.com/Tyriar/node-pty/pulls)

extracted_from_files

URL
detected URL: https://github.com/sql-js/sql.js/releases).)

XIOC detected URL: https://github.com/sql-js/sql.js/releases).)

extracted_from_files

URL
detected URL: https://github.com/krishnasrinivas/wetty)

XIOC detected URL: https://github.com/krishnasrinivas/wetty)

extracted_from_files

URL
detected URL: https://tea-ci.org/api/badges/rprichard/winpty/status.svg)](https://tea-ci.org/rprichard/winpty)

XIOC detected URL: https://tea-ci.org/api/badges/rprichard/winpty/status.svg)](https://tea-ci.org/rprichard/winpty)

extracted_from_files

URL
detected URL: https://www.tea-ci.org

XIOC detected URL: https://www.tea-ci.org

extracted_from_files

Domain
detected Domain: workbench.vscode.js.map

XIOC detected Domain: workbench.vscode.js.map

extracted_from_files

Domain
detected Domain: event.delta

XIOC detected Domain: event.delta

extracted_from_files

Domain
detected Domain: asrecord.data

XIOC detected Domain: asrecord.data

extracted_from_files

Domain
detected Domain: meta.cloud

XIOC detected Domain: meta.cloud

extracted_from_files

Domain
detected Domain: meta.pr

XIOC detected Domain: meta.pr

extracted_from_files

Domain
detected Domain: swarm.vscode.js.map

XIOC detected Domain: swarm.vscode.js.map

extracted_from_files

Domain
detected Domain: swarmifyconfig.vscode.js.map

XIOC detected Domain: swarmifyconfig.vscode.js.map

extracted_from_files

Domain
detected Domain: tasks.vscode.js.map

XIOC detected Domain: tasks.vscode.js.map

extracted_from_files

Domain
detected Domain: stest.md

XIOC detected Domain: stest.md

extracted_from_files

IP
detected Domain: ship.md

XIOC detected Domain: ship.md

extracted_from_files

IP
detected Domain: sship.md

XIOC detected Domain: sship.md

extracted_from_files

Domain
detected Domain: recap.md

XIOC detected Domain: recap.md

extracted_from_files

Domain
detected Domain: srecap.md

XIOC detected Domain: srecap.md

extracted_from_files

Domain
detected Domain: simagine.md

XIOC detected Domain: simagine.md

extracted_from_files

Domain
detected Domain: skill.name

XIOC detected Domain: skill.name

extracted_from_files

Domain
detected Domain: splan.md

XIOC detected Domain: splan.md

extracted_from_files

Domain
detected Domain: debug.md

XIOC detected Domain: debug.md

extracted_from_files

Domain
detected Domain: sdebug.md

XIOC detected Domain: sdebug.md

extracted_from_files

Domain
detected Domain: sconfirm.md

XIOC detected Domain: sconfirm.md

extracted_from_files

Domain
detected Domain: clean.md

XIOC detected Domain: clean.md

extracted_from_files

Domain
detected Domain: sclean.md

XIOC detected Domain: sclean.md

extracted_from_files

Domain
detected Domain: test.md

XIOC detected Domain: test.md

extracted_from_files

Domain
detected Domain: vscode.viewcolumn.one

XIOC detected Domain: vscode.viewcolumn.one

extracted_from_files

Domain
detected Domain: message.guide

XIOC detected Domain: message.guide

extracted_from_files

Domain
detected Domain: getting-started.md

XIOC detected Domain: getting-started.md

extracted_from_files

Domain
detected Domain: swarm-guide.md

XIOC detected Domain: swarm-guide.md

extracted_from_files

Domain
detected Domain: entry.terminal.name

XIOC detected Domain: entry.terminal.name

extracted_from_files

Domain
detected Domain: settings.vscode.js.map

XIOC detected Domain: settings.vscode.js.map

extracted_from_files

Domain
detected Domain: plan.md

XIOC detected Domain: plan.md

extracted_from_files

Domain
detected Domain: wshash.name

XIOC detected Domain: wshash.name

extracted_from_files

Domain
detected Domain: msg.id

XIOC detected Domain: msg.id

extracted_from_files

Domain
detected Domain: partfile.name

XIOC detected Domain: partfile.name

extracted_from_files

URL
detected URL: https://github.com/chjj/pty.js)

XIOC detected URL: https://github.com/chjj/pty.js)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/82.

XIOC detected URL: https://github.com/rprichard/winpty/issues/82.

extracted_from_files

URL
detected URL: https://github.com/Microsoft/node-pty/wiki/Debugging)

XIOC detected URL: https://github.com/Microsoft/node-pty/wiki/Debugging)

extracted_from_files

URL
detected URL: https://developer.microsoft.com/en-us/windows/downloads/windows-10-sdk)

XIOC detected URL: https://developer.microsoft.com/en-us/windows/downloads/windows-10-sdk)

extracted_from_files

URL
detected URL: https://github.com/felixrieseberg/windows-build-tools:

XIOC detected URL: https://github.com/felixrieseberg/windows-build-tools:

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/110)

XIOC detected URL: https://github.com/rprichard/winpty/issues/110)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/114)

XIOC detected URL: https://github.com/rprichard/winpty/issues/114)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/109)

XIOC detected URL: https://github.com/rprichard/winpty/issues/109)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/99)

XIOC detected URL: https://github.com/rprichard/winpty/issues/99)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/118)

XIOC detected URL: https://github.com/rprichard/winpty/issues/118)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/117)

XIOC detected URL: https://github.com/rprichard/winpty/issues/117)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/116)

XIOC detected URL: https://github.com/rprichard/winpty/issues/116)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/97.

XIOC detected URL: https://github.com/rprichard/winpty/issues/97.

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/98)

XIOC detected URL: https://github.com/rprichard/winpty/issues/98)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/81)

XIOC detected URL: https://github.com/rprichard/winpty/issues/81)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/commit/b4db322010d2d897e6c496fefc4f0ecc9b84c2f3)

XIOC detected URL: https://github.com/rprichard/winpty/commit/b4db322010d2d897e6c496fefc4f0ecc9b84c2f3)

extracted_from_files

URL
detected URL: https://github.com/Microsoft/vscode/issues/19665.

XIOC detected URL: https://github.com/Microsoft/vscode/issues/19665.

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/113)

XIOC detected URL: https://github.com/rprichard/winpty/issues/113)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/112)

XIOC detected URL: https://github.com/rprichard/winpty/issues/112)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/80)

XIOC detected URL: https://github.com/rprichard/winpty/issues/80)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/58)

XIOC detected URL: https://github.com/rprichard/winpty/issues/58)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/82)

XIOC detected URL: https://github.com/rprichard/winpty/issues/82)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/commit/880c00c69eeca73643ddb576f02c5badbec81f56)

XIOC detected URL: https://github.com/rprichard/winpty/commit/880c00c69eeca73643ddb576f02c5badbec81f56)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/94)

XIOC detected URL: https://github.com/rprichard/winpty/issues/94)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/commit/67a34b6c03557a5c2e0a2bdd502c2210921d8f3e)

XIOC detected URL: https://github.com/rprichard/winpty/commit/67a34b6c03557a5c2e0a2bdd502c2210921d8f3e)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/90)

XIOC detected URL: https://github.com/rprichard/winpty/issues/90)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/74)

XIOC detected URL: https://github.com/rprichard/winpty/issues/74)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/70)

XIOC detected URL: https://github.com/rprichard/winpty/issues/70)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/67)

XIOC detected URL: https://github.com/rprichard/winpty/issues/67)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/47)

XIOC detected URL: https://github.com/rprichard/winpty/issues/47)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/43)

XIOC detected URL: https://github.com/rprichard/winpty/issues/43)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/79)

XIOC detected URL: https://github.com/rprichard/winpty/issues/79)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/61)

XIOC detected URL: https://github.com/rprichard/winpty/issues/61)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/53)

XIOC detected URL: https://github.com/rprichard/winpty/issues/53)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/30)

XIOC detected URL: https://github.com/rprichard/winpty/issues/30)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/31)

XIOC detected URL: https://github.com/rprichard/winpty/issues/31)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/57)

XIOC detected URL: https://github.com/rprichard/winpty/issues/57)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/40)

XIOC detected URL: https://github.com/rprichard/winpty/issues/40)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/51).

XIOC detected URL: https://github.com/rprichard/winpty/issues/51).

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/commit/ec3eae8df5bbbb36d7628d168b0815638d122f37)

XIOC detected URL: https://github.com/rprichard/winpty/commit/ec3eae8df5bbbb36d7628d168b0815638d122f37)

extracted_from_files

URL
detected URL: https://msdn.microsoft.com/en-us/library/windows/desktop/ms682022(v=vs.85).aspx

XIOC detected URL: https://msdn.microsoft.com/en-us/library/windows/desktop/ms682022(v=vs.85).aspx

extracted_from_files

URL
detected URL: http://ehc.ac/p/mingw/bugs/2250/.

XIOC detected URL: http://ehc.ac/p/mingw/bugs/2250/.

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/commit/bde8922e08c3638e01ecc7b581b676c314163e3c)

XIOC detected URL: https://github.com/rprichard/winpty/commit/bde8922e08c3638e01ecc7b581b676c314163e3c)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/44).

XIOC detected URL: https://github.com/rprichard/winpty/issues/44).

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/19)

XIOC detected URL: https://github.com/rprichard/winpty/issues/19)

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/39).

XIOC detected URL: https://github.com/rprichard/winpty/issues/39).

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/41)

XIOC detected URL: https://github.com/rprichard/winpty/issues/41)

extracted_from_files

URL
detected URL: https://chromium.googlesource.com/external/gyp

XIOC detected URL: https://chromium.googlesource.com/external/gyp

extracted_from_files

URL
detected URL: https://conemu.github.io/en/MicrosoftBugs.html

XIOC detected URL: https://conemu.github.io/en/MicrosoftBugs.html

extracted_from_files

URL
detected URL: https://social.msdn.microsoft.com/Forums/en-US/40c8e395-cca9-45c8-b9b8-2fbe6782ac2b/readconsoleoutput-cause-access-violation-writing-location-exception

XIOC detected URL: https://social.msdn.microsoft.com/Forums/en-US/40c8e395-cca9-45c8-b9b8-2fbe6782ac2b/readconsoleoutput-cause-access-violation-writing-location-exception

extracted_from_files

URL
detected URL: http://www.lafn.org/~dave/linux/terminalIO.html.

XIOC detected URL: http://www.lafn.org/~dave/linux/terminalIO.html.

extracted_from_files

URL
detected URL: http://blogs.microsoft.co.il/blogs/pavely/archive/2009/07/23/changing-console-fonts.aspx

XIOC detected URL: http://blogs.microsoft.co.il/blogs/pavely/archive/2009/07/23/changing-console-fonts.aspx

extracted_from_files

URL
detected URL: http://www.iopus.com/guides/srvany.htm.

XIOC detected URL: http://www.iopus.com/guides/srvany.htm.

extracted_from_files

URL
detected URL: https://en.wikipedia.org/wiki/List_of_CJK_fonts

XIOC detected URL: https://en.wikipedia.org/wiki/List_of_CJK_fonts

extracted_from_files

URL
detected URL: https://github.com/JetBrains/jediterm/issues/118

XIOC detected URL: https://github.com/JetBrains/jediterm/issues/118

extracted_from_files

URL
detected URL: https://github.com/mintty/mintty/issues/480

XIOC detected URL: https://github.com/mintty/mintty/issues/480

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/109.

XIOC detected URL: https://github.com/rprichard/winpty/issues/109.

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/116

XIOC detected URL: https://github.com/rprichard/winpty/issues/116

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/74.

XIOC detected URL: https://github.com/rprichard/winpty/issues/74.

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/110.

XIOC detected URL: https://github.com/rprichard/winpty/issues/110.

extracted_from_files

URL
detected URL: https://msdn.microsoft.com/en-us/library/windows/desktop/aa384203.aspx

XIOC detected URL: https://msdn.microsoft.com/en-us/library/windows/desktop/aa384203.aspx

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/58

XIOC detected URL: https://github.com/rprichard/winpty/issues/58

extracted_from_files

URL
detected URL: https://gist.github.com/rprichard/8dd8ca134b39534b7da2733994aa07ba

XIOC detected URL: https://gist.github.com/rprichard/8dd8ca134b39534b7da2733994aa07ba

extracted_from_files

URL
detected URL: https://blogs.msdn.microsoft.com/oldnewthing/20110202-00/?p=11613.

XIOC detected URL: https://blogs.msdn.microsoft.com/oldnewthing/20110202-00/?p=11613.

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/58.

XIOC detected URL: https://github.com/rprichard/winpty/issues/58.

extracted_from_files

URL
detected URL: https://blogs.msdn.microsoft.com/oldnewthing/20110107-00/?p=11803)

XIOC detected URL: https://blogs.msdn.microsoft.com/oldnewthing/20110107-00/?p=11803)

extracted_from_files

URL
detected URL: https://blogs.msdn.microsoft.com/oldnewthing/20110202-00/?p=11613

XIOC detected URL: https://blogs.msdn.microsoft.com/oldnewthing/20110202-00/?p=11613

extracted_from_files

Domain
detected Domain: sessions.vscode.js.map

XIOC detected Domain: sessions.vscode.js.map

extracted_from_files

URL
detected URL: https://msdn.microsoft.com/en-us/library/17w5ykft.aspx

XIOC detected URL: https://msdn.microsoft.com/en-us/library/17w5ykft.aspx

extracted_from_files

URL
detected URL: https://msdn.microsoft.com/en-us/library/windows/desktop/bb776391(v=vs.85).aspx

XIOC detected URL: https://msdn.microsoft.com/en-us/library/windows/desktop/bb776391(v=vs.85).aspx

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/43.

XIOC detected URL: https://github.com/rprichard/winpty/issues/43.

extracted_from_files

URL
detected URL: https://msdn.microsoft.com/en-us/library/windows/desktop/aa387694(v=vs.85).aspx

XIOC detected URL: https://msdn.microsoft.com/en-us/library/windows/desktop/aa387694(v=vs.85).aspx

extracted_from_files

URL
detected URL: http://blogs.msdn.com/b/michael_howard/archive/2005/01/14/353379.aspx

XIOC detected URL: http://blogs.msdn.com/b/michael_howard/archive/2005/01/14/353379.aspx

extracted_from_files

URL
detected URL: https://github.com/rprichard/winpty/issues/70

XIOC detected URL: https://github.com/rprichard/winpty/issues/70

extracted_from_files

URL
detected URL: https://github.com/microsoft/vscode/issues/76548

XIOC detected URL: https://github.com/microsoft/vscode/issues/76548

extracted_from_files

URL
detected URL: https://github.com/microsoft/node-pty/issues/375

XIOC detected URL: https://github.com/microsoft/node-pty/issues/375

extracted_from_files

URL
detected URL: https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man4/pty.4.html

XIOC detected URL: https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man4/pty.4.html

extracted_from_files

URL
detected URL: https://linux.die.net/man/4/pts

XIOC detected URL: https://linux.die.net/man/4/pts

extracted_from_files

URL
detected URL: https://github.com/microsoft/node-pty/issues/833

XIOC detected URL: https://github.com/microsoft/node-pty/issues/833

extracted_from_files

URL
detected URL: http://web.mit.edu/gnu/doc/html/screen_20.html

XIOC detected URL: http://web.mit.edu/gnu/doc/html/screen_20.html

extracted_from_files

URL
detected URL: https://msdn.microsoft.com/en-us/library/windows/desktop/ms683156.aspx

XIOC detected URL: https://msdn.microsoft.com/en-us/library/windows/desktop/ms683156.aspx

extracted_from_files

URL
detected URL: http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl0a

XIOC detected URL: http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl0a

extracted_from_files

URL
detected URL: http://schemas.microsoft.com/SMI/2020/WindowsSettings

XIOC detected URL: http://schemas.microsoft.com/SMI/2020/WindowsSettings

extracted_from_files

URL
detected URL: http://schemas.microsoft.com/SMI/2016/WindowsSettings

XIOC detected URL: http://schemas.microsoft.com/SMI/2016/WindowsSettings

extracted_from_files

URL
detected URL: https://github.com/microsoft/node-pty/issues

XIOC detected URL: https://github.com/microsoft/node-pty/issues

extracted_from_files

URL
detected URL: https://github.com/microsoft/node-pty

XIOC detected URL: https://github.com/microsoft/node-pty

extracted_from_files

URL
detected URL: https://docs.microsoft.com/en-us/windows/console/closepseudoconsole

XIOC detected URL: https://docs.microsoft.com/en-us/windows/console/closepseudoconsole

extracted_from_files

URL
detected URL: https://github.com/microsoft/terminal/issues/1810

XIOC detected URL: https://github.com/microsoft/terminal/issues/1810

extracted_from_files

URL
detected URL: https://source.chromium.org/chromium/chromium/src/+/main:base/process/kill_mac.cc;l=35-69?

XIOC detected URL: https://source.chromium.org/chromium/chromium/src/+/main:base/process/kill_mac.cc;l=35-69?

extracted_from_files

URL
detected URL: http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z

XIOC detected URL: http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z

extracted_from_files

URL
detected URL: http://www.microsoft.com/pkiops/Docs/Repository.htm0

XIOC detected URL: http://www.microsoft.com/pkiops/Docs/Repository.htm0

extracted_from_files

URL
detected URL: http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl0l

XIOC detected URL: http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl0l

extracted_from_files

URL
detected URL: http://www.microsoft.com0

XIOC detected URL: http://www.microsoft.com0

extracted_from_files

URL
detected URL: http://www.microsoft.com/pkiops/docs/primarycps.htm0@

XIOC detected URL: http://www.microsoft.com/pkiops/docs/primarycps.htm0@

extracted_from_files

URL
detected URL: http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl0

XIOC detected URL: http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl0

extracted_from_files

URL
detected URL: https://github.com/microsoft/vscode-dev-containers/tree/v0.155.1/containers/typescript-node

XIOC detected URL: https://github.com/microsoft/vscode-dev-containers/tree/v0.155.1/containers/typescript-node

extracted_from_files

URL
detected URL: https://aka.ms/devcontainer.json.

XIOC detected URL: https://aka.ms/devcontainer.json.

extracted_from_files

URL
detected URL: https://github.com/emscripten-core/emsdk.git

XIOC detected URL: https://github.com/emscripten-core/emsdk.git

extracted_from_files

URL
detected URL: https://github.com/sourcelair/xterm.js)).

XIOC detected URL: https://github.com/sourcelair/xterm.js)).

extracted_from_files

Domain
detected Domain: social.msdn.microsoft.com

XIOC detected Domain: social.msdn.microsoft.com

extracted_from_files

Domain
detected Domain: writeregion.top

XIOC detected Domain: writeregion.top

extracted_from_files

Domain
detected Domain: readbuffer.data

XIOC detected Domain: readbuffer.data

extracted_from_files

Domain
detected Domain: envv.data

XIOC detected Domain: envv.data

extracted_from_files

Domain
detected Domain: cmdlinev.data

XIOC detected Domain: cmdlinev.data

extracted_from_files

Domain
detected Domain: bytes.data

XIOC detected Domain: bytes.data

extracted_from_files

Domain
detected Domain: packetdata.data

XIOC detected Domain: packetdata.data

extracted_from_files

Domain
detected Domain: chromium.googlesource.com

XIOC detected Domain: chromium.googlesource.com

extracted_from_files

Domain
detected Domain: f.read

XIOC detected Domain: f.read

extracted_from_files

Domain
detected Domain: os.name

XIOC detected Domain: os.name

extracted_from_files

Domain
detected Domain: font.family

XIOC detected Domain: font.family

extracted_from_files

Domain
detected Domain: getfont.cc

XIOC detected Domain: getfont.cc

extracted_from_files

Domain
detected Domain: setfont.cc

XIOC detected Domain: setfont.cc

extracted_from_files

Domain
detected Domain: fontsurvey.cc

XIOC detected Domain: fontsurvey.cc

extracted_from_files

Domain
detected Domain: utf16echo.cc

XIOC detected Domain: utf16echo.cc

extracted_from_files

Domain
detected Domain: loop.run

XIOC detected Domain: loop.run

extracted_from_files

Domain
detected Domain: desktopv.data

XIOC detected Domain: desktopv.data

extracted_from_files

Domain
detected Domain: waithandles.data

XIOC detected Domain: waithandles.data

extracted_from_files

Domain
detected Domain: idstr.data

XIOC detected Domain: idstr.data

extracted_from_files

Domain
detected Domain: ctx.e.id

XIOC detected Domain: ctx.e.id

extracted_from_files

Domain
detected Domain: str.data

XIOC detected Domain: str.data

extracted_from_files

Domain
detected Domain: prevdata.data

XIOC detected Domain: prevdata.data

extracted_from_files

Domain
detected Domain: mousewindowrect.top

XIOC detected Domain: mousewindowrect.top

extracted_from_files

Domain
detected Domain: records.data

XIOC detected Domain: records.data

extracted_from_files

Domain
detected Domain: windowsbugcrashreader.cc

XIOC detected Domain: windowsbugcrashreader.cc

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Agents is a OpenVSX Registry extension published by swarmify. Version 0.5.1 has been analyzed by the Risky Plugins security platform, receiving a risk score of 100/100 (CRITICAL risk) based on 1883 security findings.

Risk Assessment

This extension presents critical security risk. Severe issues were detected, potentially including malware indicators, exposed secrets, or dangerous behaviors. Installation is strongly discouraged until these issues are addressed.

Findings Breakdown

  • High: 153 finding(s)
  • Medium: 1610 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Agents is published by swarmify on the OpenVSX Registry marketplace.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions