Is "AVAP DEV Extensions for Microsoft Visual Studio" on VS Code Marketplace Safe to Install?
VerifiedAVAP DEV Extensions for Microsoft Visual Studio
Risk Assessment
Analyzed19680 security findings detected across all analyzers
VS Code extension analyzed via package manifest and static code analysis
Severity Breakdown
Finding Categories
YARA Rules Matched
16 rules(1000 hits)About This Extension
Detailed Findings
1000 totalYARA Rule Matches
16 rulesAI Security Report
AI Security Analysis: AVAP DEV Extensions for Microsoft Visual Studio
Analysis generated: 2025-12-12T02:22:06+13:00
Model: gemini-3-pro-preview
Quick Facts
| Property | Value |
|---|---|
| UUID | 17012d65-05be-5e2f-992e-4b5e0ce66f29 |
| Type | vscode |
| Version | 1.31.141 |
| Users | 874 |
| Risk Score | 100.0/100 (CRITICAL) |
| Malware Detected | ⚠️ Yes |
| Secrets Exposed | ✅ No |
| Critical Vulns | ✅ No |
AI Analysis
Based on the security scan data provided for the "AVAP DEV Extensions for Microsoft Visual Studio," here is the detailed security analysis.
Executive Summary
Do not install or use this extension. The "AVAP DEV Extensions" presents a CRITICAL security risk (Score: 100/100) and exhibits behavior consistent with malicious supply chain attacks. The analysis detected over 2,700 instances of potential file manipulation scripts and nearly 17,000 indicators of compromise (IOCs). Combined with an unverified publisher and a low trust score, this extension should be considered actively malicious or severely compromised.
Threat Assessment
The security posture of this extension is non-existent. The findings indicate a high probability that this extension acts as a dropper or a persistence mechanism for malware.
- Supply Chain Attack Vector: The primary threat is identified by the
postinstall_file_manipulationYARA signature. In the Node.js/VS Code ecosystem,postinstallscripts run automatically as soon as the extension is installed. The sheer volume of these findings (2,706) suggests the extension is attempting to modify files across the directory structure or is bundling a heavily infected dependency tree. - Massive IOC Presence: The presence of 16,925 IOCs (Indicators of Compromise) is highly abnormal for a legitimate development tool. This suggests the extension either contains a database of malicious domains/IPs (potentially for use in a botnet or redirector) or is communicating with a vast network of suspicious infrastructure.
- Unverified Origin: The publisher "AVAP Framework" is unverified. In the context of VS Code extensions, unverified publishers with low user counts (874) releasing extensions with critical malware signatures are a classic profile for malicious actors targeting developers.
Risk Justification
The calculated risk score of 100.0/100 is fully justified and accurate.
- Severity of Findings: The presence of
postinstall_file_manipulationis a high-fidelity indicator of malicious intent in this context. It implies the extension attempts to alter the host system immediately upon installation, often to establish persistence or disable security controls. - Volume of Findings: A typical benign extension might have 0-5 false positives. This extension has nearly 20,000 findings. This volume indicates that the codebase is fundamentally unsafe.
- Trust Metrics: A Trust Score of 0/100 combined with an unverified publisher confirms there is no historical reputation to mitigate the technical findings.
Key Findings
- Systemic File Manipulation (High Severity): The analysis flagged 2,706 instances of
YARA--postinstall_file_manipulation. This indicates the extension utilizes scripts designed to modify files on the host system immediately after installation. This is a common technique used to inject malware into a developer's environment. - Abnormal IOC Count (Medium Severity): The extension contains 16,925 Indicators of Compromise. This is statistically impossible for a standard "Dev Extension" unless it is designed to interact with malicious infrastructure or is bundling a massive list of compromised endpoints.
- Network Activity: There are 39 specific network findings. While low compared to the IOCs, in conjunction with the file manipulation scripts, this likely represents Command and Control (C2) beaconing or data exfiltration attempts.
- Obfuscated/Unknown Locations: The findings report the location as
unknown_file, which often indicates the malicious code is generated dynamically, packed, or hidden within deep dependency structures to evade static analysis.
Recommendations
- Immediate Removal: If this extension is installed on any environment, uninstall it immediately.
- Incident Response: Treat any machine that had this extension installed as compromised. Rotate all credentials (API keys, SSH keys, passwords) stored on or accessible by that machine, as the
postinstallscripts may have exfiltrated them. - Block at Organization Level: Add the Extension UUID (
17012d65-05be-5e2f-992e-4b5e0ce66f29) to the organization's VS Code blocklist to prevent installation. - Report to Marketplace: File a report with the Visual Studio Marketplace to have this extension taken down for policy violations and malware distribution.
Mitigation Strategies
There is no safe way to use this extension in a production or development environment.
If this extension must be analyzed for forensic purposes:
- Strict Isolation: Only install this extension inside a disposable, non-networked Virtual Machine (VM) or a sandbox environment that has no access to the host file system.
- Network Air-Gap: Ensure the sandbox has no internet access to prevent the extension from contacting the C2 servers associated with the 16,000+ IOCs.
- Credential Isolation: Do not log in to any services or store any secrets in the environment where this extension is loaded.
Confidence Assessment
Confidence Level: 80%
While YARA rules can occasionally generate false positives (e.g., a legitimate build tool might look like a file manipulator), the volume of findings (nearly 20,000) and the specific combination of postinstall triggers with an unverified publisher makes the likelihood of this being a false positive statistically insignificant. The analysis strongly points to a malicious actor or a severely compromised dependency chain.
Disclaimer
This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace
Azure Resource Manager (ARM) Tools
Microsoft
EveryOps Extension
EveryOps-ai
SayDeploy - Copilot Assistant
LunarWerx
AVAP API Release Manager
AVAP Framework
Copilot MCP + Agent Skills Manager
Automata Labs
Code Guardian
DreamersRedemption