Is "AVAP DEV Extensions for Microsoft Visual Studio" on VS Code Marketplace Safe to Install?

Verified
AVAP Framework · vscode · v1.31.141

AVAP DEV Extensions for Microsoft Visual Studio

Risk Assessment

Analyzed
100
out of 100
CRITICAL

19680 security findings detected across all analyzers

VS Code extension analyzed via package manifest and static code analysis

Severity Breakdown

0
Critical
2706
High
16964
Medium
10
Low
0
Info

Finding Categories

1000
Malware Signatures

YARA Rules Matched

16 rules(1000 hits)
postinstall file manipulation postinstall obfuscation postinstall crypto operations postinstall system command postinstall file download DebuggerStatementsShouldNotBeUsed postinstall registry modification postinstall environment access SQLInjection postinstall network communication postinstall persistence mechanism credential env files UsingCommandLineArguments AlertStatementsShouldNotBeUsed NoUseWeakRandom APT1 WEBC2 Y21K

About This Extension

AVAP DEV Extensions for Microsoft Visual Studio

Detailed Findings

1000 total

YARA Rule Matches

16 rules

AI Security Report

AI Security Analysis: AVAP DEV Extensions for Microsoft Visual Studio

Analysis generated: 2025-12-12T02:22:06+13:00
Model: gemini-3-pro-preview


Quick Facts

Property Value
UUID 17012d65-05be-5e2f-992e-4b5e0ce66f29
Type vscode
Version 1.31.141
Users 874
Risk Score 100.0/100 (CRITICAL)
Malware Detected ⚠️ Yes
Secrets Exposed ✅ No
Critical Vulns ✅ No

AI Analysis

Based on the security scan data provided for the "AVAP DEV Extensions for Microsoft Visual Studio," here is the detailed security analysis.

Executive Summary

Do not install or use this extension. The "AVAP DEV Extensions" presents a CRITICAL security risk (Score: 100/100) and exhibits behavior consistent with malicious supply chain attacks. The analysis detected over 2,700 instances of potential file manipulation scripts and nearly 17,000 indicators of compromise (IOCs). Combined with an unverified publisher and a low trust score, this extension should be considered actively malicious or severely compromised.

Threat Assessment

The security posture of this extension is non-existent. The findings indicate a high probability that this extension acts as a dropper or a persistence mechanism for malware.

  • Supply Chain Attack Vector: The primary threat is identified by the postinstall_file_manipulation YARA signature. In the Node.js/VS Code ecosystem, postinstall scripts run automatically as soon as the extension is installed. The sheer volume of these findings (2,706) suggests the extension is attempting to modify files across the directory structure or is bundling a heavily infected dependency tree.
  • Massive IOC Presence: The presence of 16,925 IOCs (Indicators of Compromise) is highly abnormal for a legitimate development tool. This suggests the extension either contains a database of malicious domains/IPs (potentially for use in a botnet or redirector) or is communicating with a vast network of suspicious infrastructure.
  • Unverified Origin: The publisher "AVAP Framework" is unverified. In the context of VS Code extensions, unverified publishers with low user counts (874) releasing extensions with critical malware signatures are a classic profile for malicious actors targeting developers.

Risk Justification

The calculated risk score of 100.0/100 is fully justified and accurate.

  • Severity of Findings: The presence of postinstall_file_manipulation is a high-fidelity indicator of malicious intent in this context. It implies the extension attempts to alter the host system immediately upon installation, often to establish persistence or disable security controls.
  • Volume of Findings: A typical benign extension might have 0-5 false positives. This extension has nearly 20,000 findings. This volume indicates that the codebase is fundamentally unsafe.
  • Trust Metrics: A Trust Score of 0/100 combined with an unverified publisher confirms there is no historical reputation to mitigate the technical findings.

Key Findings

  • Systemic File Manipulation (High Severity): The analysis flagged 2,706 instances of YARA--postinstall_file_manipulation. This indicates the extension utilizes scripts designed to modify files on the host system immediately after installation. This is a common technique used to inject malware into a developer's environment.
  • Abnormal IOC Count (Medium Severity): The extension contains 16,925 Indicators of Compromise. This is statistically impossible for a standard "Dev Extension" unless it is designed to interact with malicious infrastructure or is bundling a massive list of compromised endpoints.
  • Network Activity: There are 39 specific network findings. While low compared to the IOCs, in conjunction with the file manipulation scripts, this likely represents Command and Control (C2) beaconing or data exfiltration attempts.
  • Obfuscated/Unknown Locations: The findings report the location as unknown_file, which often indicates the malicious code is generated dynamically, packed, or hidden within deep dependency structures to evade static analysis.

Recommendations

  1. Immediate Removal: If this extension is installed on any environment, uninstall it immediately.
  2. Incident Response: Treat any machine that had this extension installed as compromised. Rotate all credentials (API keys, SSH keys, passwords) stored on or accessible by that machine, as the postinstall scripts may have exfiltrated them.
  3. Block at Organization Level: Add the Extension UUID (17012d65-05be-5e2f-992e-4b5e0ce66f29) to the organization's VS Code blocklist to prevent installation.
  4. Report to Marketplace: File a report with the Visual Studio Marketplace to have this extension taken down for policy violations and malware distribution.

Mitigation Strategies

There is no safe way to use this extension in a production or development environment.

If this extension must be analyzed for forensic purposes:

  1. Strict Isolation: Only install this extension inside a disposable, non-networked Virtual Machine (VM) or a sandbox environment that has no access to the host file system.
  2. Network Air-Gap: Ensure the sandbox has no internet access to prevent the extension from contacting the C2 servers associated with the 16,000+ IOCs.
  3. Credential Isolation: Do not log in to any services or store any secrets in the environment where this extension is loaded.

Confidence Assessment

Confidence Level: 80%

While YARA rules can occasionally generate false positives (e.g., a legitimate build tool might look like a file manipulator), the volume of findings (nearly 20,000) and the specific combination of postinstall triggers with an unverified publisher makes the likelihood of this being a false positive statistically insignificant. The analysis strongly points to a malicious actor or a severely compromised dependency chain.


Disclaimer

This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.

Frequently Asked Questions