Is "Rainbow Fart" on JetBrains Marketplace Safe to Install?

Verified
Zhihao Zhang · jetbrains · v1.3.7

Rainbow Fart for IntelliJ based IDEs IntelliJ Rainbow Fart is an extension that keeps giving you compliment while you are coding. It will check the keywords in your...

Risk Assessment

Analyzed
80.9
out of 100
HIGH

82 security findings detected across all analyzers

JetBrains plugin analyzed via plugin.xml configuration and static code analysis

Severity Breakdown

0
Critical
12
High
63
Medium
0
Low
0
Info

Finding Categories

12
Malware Signatures
63
IoC Indicators

YARA Rules Matched

7 rules(12 hits)
postinstall obfuscation postinstall network communication postinstall persistence mechanism postinstall system command postinstall file download postinstall crypto operations postinstall registry modification

About This Extension

Rainbow Fart for IntelliJ based IDEs IntelliJ Rainbow Fart is an extension that keeps giving you compliment while you are coding. It will check the keywords in your...

Detailed Findings

19 total

YARA Rule Matches

7 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

IP Addresses
11
Domains
52
Strings
63

All Indicators · 63

Domain
detected Domain: 05.mp

XIOC detected Domain: 05.mp

extracted_from_files

IP
detected IP: a::

XIOC detected IP: a::

extracted_from_files

Domain
detected Domain: dy.nu

XIOC detected Domain: dy.nu

extracted_from_files

Domain
detected Domain: c.cw

XIOC detected Domain: c.cw

extracted_from_files

Domain
detected Domain: 7.hk

XIOC detected Domain: 7.hk

extracted_from_files

Domain
detected Domain: f.mo

XIOC detected Domain: f.mo

extracted_from_files

Domain
detected Domain: l.bf

XIOC detected Domain: l.bf

extracted_from_files

Domain
detected Domain: o.pr

XIOC detected Domain: o.pr

extracted_from_files

Domain
detected Domain: w.st

XIOC detected Domain: w.st

extracted_from_files

Domain
detected Domain: x.kz

XIOC detected Domain: x.kz

extracted_from_files

Domain
detected Domain: e.icu

XIOC detected Domain: e.icu

extracted_from_files

Domain
detected Domain: u0.sc

XIOC detected Domain: u0.sc

extracted_from_files

Domain
detected Domain: oq.gq

XIOC detected Domain: oq.gq

extracted_from_files

Domain
detected Domain: 賂.gy

XIOC detected Domain: 賂.gy

extracted_from_files

Domain
detected Domain: r.cn

XIOC detected Domain: r.cn

extracted_from_files

Domain
detected Domain: ϟ.me

XIOC detected Domain: ϟ.me

extracted_from_files

IP
detected IP: 9::

XIOC detected IP: 9::

extracted_from_files

Domain
detected Domain: 4.zw

XIOC detected Domain: 4.zw

extracted_from_files

Domain
detected Domain: 8bw.az

XIOC detected Domain: 8bw.az

extracted_from_files

Domain
detected Domain: z.cm

XIOC detected Domain: z.cm

extracted_from_files

Domain
detected Domain: v.gq

XIOC detected Domain: v.gq

extracted_from_files

Domain
detected Domain: pom.properties

XIOC detected Domain: pom.properties

extracted_from_files

Domain
detected Domain: s.lr

XIOC detected Domain: s.lr

extracted_from_files

Domain
detected Domain: in.ss

XIOC detected Domain: in.ss

extracted_from_files

Domain
detected Domain: eb.gr

XIOC detected Domain: eb.gr

extracted_from_files

Domain
detected Domain: s.mg

XIOC detected Domain: s.mg

extracted_from_files

Domain
detected Domain: 04.mp

XIOC detected Domain: 04.mp

extracted_from_files

Domain
detected Domain: s.פ.ug

XIOC detected Domain: s.פ.ug

extracted_from_files

Domain
detected Domain: 9.la

XIOC detected Domain: 9.la

extracted_from_files

Domain
detected Domain: 3.kr

XIOC detected Domain: 3.kr

extracted_from_files

Domain
detected Domain: k.il

XIOC detected Domain: k.il

extracted_from_files

Domain
detected Domain: xz.ad

XIOC detected Domain: xz.ad

extracted_from_files

Domain
detected Domain: c.bi

XIOC detected Domain: c.bi

extracted_from_files

Domain
detected Domain: mi.gt

XIOC detected Domain: mi.gt

extracted_from_files

Domain
detected Domain: function.mp

XIOC detected Domain: function.mp

extracted_from_files

Domain
detected Domain: g.cm

XIOC detected Domain: g.cm

extracted_from_files

Domain
detected Domain: c.ba

XIOC detected Domain: c.ba

extracted_from_files

Domain
detected Domain: y.kg

XIOC detected Domain: y.kg

extracted_from_files

Domain
detected Domain: l.et

XIOC detected Domain: l.et

extracted_from_files

Domain
detected Domain: s.hr

XIOC detected Domain: s.hr

extracted_from_files

Domain
detected Domain: j.vu

XIOC detected Domain: j.vu

extracted_from_files

Domain
detected Domain: n.kg

XIOC detected Domain: n.kg

extracted_from_files

Domain
detected Domain: 02.mp

XIOC detected Domain: 02.mp

extracted_from_files

Domain
detected Domain: 03.mp

XIOC detected Domain: 03.mp

extracted_from_files

Domain
detected Domain: k.fo

XIOC detected Domain: k.fo

extracted_from_files

Domain
detected Domain: 9.ke

XIOC detected Domain: 9.ke

extracted_from_files

Domain
detected Domain: n.td

XIOC detected Domain: n.td

extracted_from_files

IP
detected IP: 7::

XIOC detected IP: 7::

extracted_from_files

Domain
detected Domain: gō.ۍ.sg

XIOC detected Domain: gō.ۍ.sg

extracted_from_files

IP
detected IP: ::d

XIOC detected IP: ::d

extracted_from_files

Domain
detected Domain: readme.md

XIOC detected Domain: readme.md

extracted_from_files

Domain
detected Domain: 01.mp

XIOC detected Domain: 01.mp

extracted_from_files

Domain
detected Domain: k.ck

XIOC detected Domain: k.ck

extracted_from_files

Domain
detected Domain: x.sn

XIOC detected Domain: x.sn

extracted_from_files

IP
detected IP: ::6

XIOC detected IP: ::6

extracted_from_files

IP
detected IP: f::

XIOC detected IP: f::

extracted_from_files

IP
detected IP: 8::

XIOC detected IP: 8::

extracted_from_files

IP
detected IP: 2::

XIOC detected IP: 2::

extracted_from_files

IP
detected IP: c::e

XIOC detected IP: c::e

extracted_from_files

IP
detected IP: ::e

XIOC detected IP: ::e

extracted_from_files

IP
detected IP: d::

XIOC detected IP: d::

extracted_from_files

Domain
detected Domain: ӌa.nl

XIOC detected Domain: ӌa.nl

extracted_from_files

Domain
detected Domain: b.de

XIOC detected Domain: b.de

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Rainbow Fart is a jetbrains extension published by Zhihao Zhang. Version 1.3.7 has been analyzed by the Risky Plugins security platform, receiving a risk score of 80.9/100 (HIGH risk) based on 82 security findings.

Risk Assessment

This extension presents critical security risk. Severe issues were detected, potentially including malware indicators, exposed secrets, or dangerous behaviors. Installation is strongly discouraged until these issues are addressed.

Findings Breakdown

  • High: 12 finding(s)
  • Medium: 63 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Rainbow Fart is published by Zhihao Zhang on the jetbrains marketplace. The extension has approximately 64K users.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions