Is "Qt Support" on VS Code Marketplace Safe to Install?

Kylin-IDE Team · vscode · v0.4.3

Create Qt project, add Qt components, press 'Shift + F1' to view the documentation under cursor...

Risk Assessment

Analyzed
56.97
out of 100
MEDIUM

392 security findings detected across all analyzers

VS Code extension analyzed via package manifest and static code analysis

Severity Breakdown

0
Critical
84
High
303
Medium
5
Low
0
Info

Finding Categories

84
Malware Signatures
1
Network
300
IoC Indicators

YARA Rules Matched

13 rules(84 hits)
postinstall obfuscation postinstall system command SQLInjection postinstall file manipulation postinstall network communication postinstall file download postinstall persistence mechanism NoUseWeakRandom LocalStorageShouldNotBeUsed postinstall crypto operations credential env files UsingCommandLineArguments UsingShellInterpreterWhenExecutingOSCommands

About This Extension

Create Qt project, add Qt components, press 'Shift + F1' to view the documentation under cursor...

Detailed Findings

90 total

YARA Rule Matches

13 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
26
IP Addresses
7
Domains
260
Strings
300

All Indicators · 300

Domain
detected Domain: i.ma

XIOC detected Domain: i.ma

extracted_from_files

Domain
detected Domain: n.target

XIOC detected Domain: n.target

extracted_from_files

Domain
detected Domain: e.data

XIOC detected Domain: e.data

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

URL
detected URL: http://schemas.microsoft.com/developer/vsx-schema/2011

XIOC detected URL: http://schemas.microsoft.com/developer/vsx-schema/2011

extracted_from_files

URL
detected URL: http://schemas.microsoft.com/developer/vsx-schema-design/2011

XIOC detected URL: http://schemas.microsoft.com/developer/vsx-schema-design/2011

extracted_from_files

URL
detected URL: https://gitee.com/openKylin/ide-qt-support/issues

XIOC detected URL: https://gitee.com/openKylin/ide-qt-support/issues

extracted_from_files

Hash
detected MD5 Hash: 38dcd33a732ebca5a557e04831e9e235

XIOC detected MD5 Hash: 38dcd33a732ebca5a557e04831e9e235

extracted_from_files

Hash
detected MD5 Hash: 0123456789ABCDEF0123456789abcdef

XIOC detected MD5 Hash: 0123456789ABCDEF0123456789abcdef

extracted_from_files

Hash
detected SHA1 Hash: 7bc75dfe779ad5b35d9bf4013d9181864358cb49

XIOC detected SHA1 Hash: 7bc75dfe779ad5b35d9bf4013d9181864358cb49

extracted_from_files

Hash
detected SHA256 Hash: d8cd6d49b46a395b13955387d05e9e1a2a47e54fb99f3c9b59835bbefad6af77

XIOC detected SHA256 Hash: d8cd6d49b46a395b13955387d05e9e1a2a47e54fb99f3c9b59835bbefad6af77

extracted_from_files

URL
detected URL: http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl0a

XIOC detected URL: http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl0a

extracted_from_files

URL
detected URL: http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl0

XIOC detected URL: http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl0

extracted_from_files

Domain
detected Domain: schemas.openxmlformats.org

XIOC detected Domain: schemas.openxmlformats.org

extracted_from_files

IP
detected IP: ::d

XIOC detected IP: ::d

extracted_from_files

IP
detected IP: ::de

XIOC detected IP: ::de

extracted_from_files

IP
detected IP: ::c

XIOC detected IP: ::c

extracted_from_files

IP
detected IP: ::ca

XIOC detected IP: ::ca

extracted_from_files

IP
detected IP: a::

XIOC detected IP: a::

extracted_from_files

IP
detected IP: ea::

XIOC detected IP: ea::

extracted_from_files

Domain
detected Domain: o.call

XIOC detected Domain: o.call

extracted_from_files

Domain
detected Domain: ue.fast

XIOC detected Domain: ue.fast

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

Domain
detected Domain: dvratil.cz

XIOC detected Domain: dvratil.cz

extracted_from_files

Domain
detected Domain: gmail.com

XIOC detected Domain: gmail.com

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

Domain
detected Domain: gitee.com

XIOC detected Domain: gitee.com

extracted_from_files

Domain
detected Domain: this.target

XIOC detected Domain: this.target

extracted_from_files

Domain
detected Domain: u.name

XIOC detected Domain: u.name

extracted_from_files

Domain
detected Domain: u.next

XIOC detected Domain: u.next

extracted_from_files

Domain
detected Domain: this.next

XIOC detected Domain: this.next

extracted_from_files

Domain
detected Domain: e.call

XIOC detected Domain: e.call

extracted_from_files

Domain
detected Domain: n.watch

XIOC detected Domain: n.watch

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

Domain
detected Domain: this.options.property

XIOC detected Domain: this.options.property

extracted_from_files

Domain
detected Domain: c.name

XIOC detected Domain: c.name

extracted_from_files

Domain
detected Domain: t.name

XIOC detected Domain: t.name

extracted_from_files

Domain
detected Domain: t.property

XIOC detected Domain: t.property

extracted_from_files

Domain
detected Domain: c.property

XIOC detected Domain: c.property

extracted_from_files

Domain
detected Domain: o.name

XIOC detected Domain: o.name

extracted_from_files

Domain
detected Domain: i.map

XIOC detected Domain: i.map

extracted_from_files

Domain
detected Domain: i.menu

XIOC detected Domain: i.menu

extracted_from_files

Domain
detected Domain: e.name

XIOC detected Domain: e.name

extracted_from_files

Domain
detected Domain: this.dependencies.map

XIOC detected Domain: this.dependencies.map

extracted_from_files

Domain
detected Domain: n.call

XIOC detected Domain: n.call

extracted_from_files

Domain
detected Domain: this.state.name

XIOC detected Domain: this.state.name

extracted_from_files

Domain
detected Domain: new.target

XIOC detected Domain: new.target

extracted_from_files

Domain
detected Domain: n.name

XIOC detected Domain: n.name

extracted_from_files

Domain
detected Domain: this.proxy.name

XIOC detected Domain: this.proxy.name

extracted_from_files

Domain
detected Domain: this.id

XIOC detected Domain: this.id

extracted_from_files

Domain
detected Domain: t.target

XIOC detected Domain: t.target

extracted_from_files

Domain
detected Domain: t.ping

XIOC detected Domain: t.ping

extracted_from_files

Domain
detected Domain: t.download

XIOC detected Domain: t.download

extracted_from_files

Domain
detected Domain: i.tab

XIOC detected Domain: i.tab

extracted_from_files

Domain
detected Domain: i.space

XIOC detected Domain: i.space

extracted_from_files

Domain
detected Domain: this.store

XIOC detected Domain: this.store

extracted_from_files

Domain
detected Domain: this.style

XIOC detected Domain: this.style

extracted_from_files

Domain
detected Domain: t.host

XIOC detected Domain: t.host

extracted_from_files

Domain
detected Domain: r.id

XIOC detected Domain: r.id

extracted_from_files

Domain
detected Domain: t.id

XIOC detected Domain: t.id

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: this.proxy.click

XIOC detected Domain: this.proxy.click

extracted_from_files

Domain
detected Domain: e.id

XIOC detected Domain: e.id

extracted_from_files

Domain
detected Domain: this.node.target

XIOC detected Domain: this.node.target

extracted_from_files

Domain
detected Domain: this.observer.call

XIOC detected Domain: this.observer.call

extracted_from_files

Domain
detected Domain: this.observer

XIOC detected Domain: this.observer

extracted_from_files

Domain
detected Domain: e.properties

XIOC detected Domain: e.properties

extracted_from_files

Domain
detected Domain: i.properties

XIOC detected Domain: i.properties

extracted_from_files

Domain
detected Domain: e.style

XIOC detected Domain: e.style

extracted_from_files

Domain
detected Domain: s.name

XIOC detected Domain: s.name

extracted_from_files

Domain
detected Domain: t.open

XIOC detected Domain: t.open

extracted_from_files

Domain
detected Domain: e.top

XIOC detected Domain: e.top

extracted_from_files

Domain
detected Domain: this.open

XIOC detected Domain: this.open

extracted_from_files

Domain
detected Domain: this.control.select

XIOC detected Domain: this.control.select

extracted_from_files

Domain
detected Domain: this.langlist.firstchild.click

XIOC detected Domain: this.langlist.firstchild.click

extracted_from_files

Domain
detected Domain: this.search

XIOC detected Domain: this.search

extracted_from_files

Domain
detected Domain: content.id

XIOC detected Domain: content.id

extracted_from_files

Domain
detected Domain: this.dialogbuttons.id

XIOC detected Domain: this.dialogbuttons.id

extracted_from_files

Domain
detected Domain: u.ha.bb

XIOC detected Domain: u.ha.bb

extracted_from_files

Domain
detected Domain: c.va

XIOC detected Domain: c.va

extracted_from_files

Domain
detected Domain: c.ga

XIOC detected Domain: c.ga

extracted_from_files

Domain
detected Domain: this.finishbtn.id

XIOC detected Domain: this.finishbtn.id

extracted_from_files

Domain
detected Domain: this.warnmsgdiv.id

XIOC detected Domain: this.warnmsgdiv.id

extracted_from_files

Domain
detected Domain: o.next

XIOC detected Domain: o.next

extracted_from_files

Domain
detected Domain: h.next

XIOC detected Domain: h.next

extracted_from_files

Domain
detected Domain: a.call

XIOC detected Domain: a.call

extracted_from_files

Domain
detected Domain: r.watch

XIOC detected Domain: r.watch

extracted_from_files

Domain
detected Domain: ae.fast

XIOC detected Domain: ae.fast

extracted_from_files

Domain
detected Domain: fontello.com

XIOC detected Domain: fontello.com

extracted_from_files

Domain
detected Domain: t.directory

XIOC detected Domain: t.directory

extracted_from_files

Domain
detected Domain: be.properties

XIOC detected Domain: be.properties

extracted_from_files

Domain
detected Domain: o.id

XIOC detected Domain: o.id

extracted_from_files

Domain
detected Domain: r.call

XIOC detected Domain: r.call

extracted_from_files

Domain
detected Domain: r.name

XIOC detected Domain: r.name

extracted_from_files

Domain
detected Domain: d.name

XIOC detected Domain: d.name

extracted_from_files

Domain
detected Domain: d.property

XIOC detected Domain: d.property

extracted_from_files

Domain
detected Domain: h.name

XIOC detected Domain: h.name

extracted_from_files

Domain
detected Domain: nd.call

XIOC detected Domain: nd.call

extracted_from_files

Domain
detected Domain: pd.call

XIOC detected Domain: pd.call

extracted_from_files

Domain
detected Domain: this.qtselect.open

XIOC detected Domain: this.qtselect.open

extracted_from_files

Domain
detected Domain: this.options.directory

XIOC detected Domain: this.options.directory

extracted_from_files

Domain
detected Domain: this.options.name

XIOC detected Domain: this.options.name

extracted_from_files

Domain
detected Domain: this.qtselect.firstselectedoption.id

XIOC detected Domain: this.qtselect.firstselectedoption.id

extracted_from_files

Domain
detected Domain: r.target

XIOC detected Domain: r.target

extracted_from_files

Domain
detected Domain: t.call

XIOC detected Domain: t.call

extracted_from_files

Domain
detected Domain: ro.call

XIOC detected Domain: ro.call

extracted_from_files

Domain
detected Domain: m.open

XIOC detected Domain: m.open

extracted_from_files

Domain
detected Domain: m.call

XIOC detected Domain: m.call

extracted_from_files

Domain
detected Domain: t.read

XIOC detected Domain: t.read

extracted_from_files

Domain
detected Domain: date.now

XIOC detected Domain: date.now

extracted_from_files

Domain
detected Domain: yn.call

XIOC detected Domain: yn.call

extracted_from_files

Domain
detected Domain: je.read

XIOC detected Domain: je.read

extracted_from_files

Domain
detected Domain: wt.read

XIOC detected Domain: wt.read

extracted_from_files

Domain
detected Domain: l.call

XIOC detected Domain: l.call

extracted_from_files

Domain
detected Domain: e.read

XIOC detected Domain: e.read

extracted_from_files

Domain
detected Domain: ie.prototype.open

XIOC detected Domain: ie.prototype.open

extracted_from_files

Domain
detected Domain: i.prototype.open

XIOC detected Domain: i.prototype.open

extracted_from_files

Domain
detected Domain: oe.call

XIOC detected Domain: oe.call

extracted_from_files

Domain
detected Domain: object.prototype.hasownproperty.call

XIOC detected Domain: object.prototype.hasownproperty.call

extracted_from_files

Domain
detected Domain: nt.link

XIOC detected Domain: nt.link

extracted_from_files

Domain
detected Domain: r.map

XIOC detected Domain: r.map

extracted_from_files

Domain
detected Domain: s.map

XIOC detected Domain: s.map

extracted_from_files

Domain
detected Domain: t.dev

XIOC detected Domain: t.dev

extracted_from_files

Domain
detected Domain: e.dev

XIOC detected Domain: e.dev

extracted_from_files

Domain
detected Domain: ir.open

XIOC detected Domain: ir.open

extracted_from_files

Domain
detected Domain: this.bb

XIOC detected Domain: this.bb

extracted_from_files

Domain
detected Domain: c.prototype.bb

XIOC detected Domain: c.prototype.bb

extracted_from_files

Domain
detected Domain: this.na

XIOC detected Domain: this.na

extracted_from_files

Domain
detected Domain: this.za

XIOC detected Domain: this.za

extracted_from_files

Domain
detected Domain: this.ua

XIOC detected Domain: this.ua

extracted_from_files

Domain
detected Domain: this.la

XIOC detected Domain: this.la

extracted_from_files

Domain
detected Domain: ce.win

XIOC detected Domain: ce.win

extracted_from_files

Domain
detected Domain: this.gb

XIOC detected Domain: this.gb

extracted_from_files

Domain
detected Domain: this.ua.free

XIOC detected Domain: this.ua.free

extracted_from_files

Domain
detected Domain: d.prototype.next

XIOC detected Domain: d.prototype.next

extracted_from_files

Domain
detected Domain: this.db.za

XIOC detected Domain: this.db.za

extracted_from_files

Domain
detected Domain: c.prototype.free

XIOC detected Domain: c.prototype.free

extracted_from_files

Domain
detected Domain: s.la

XIOC detected Domain: s.la

extracted_from_files

Domain
detected Domain: c.prototype.run

XIOC detected Domain: c.prototype.run

extracted_from_files

Domain
detected Domain: a.open

XIOC detected Domain: a.open

extracted_from_files

Domain
detected Domain: object.hasownproperty.call

XIOC detected Domain: object.hasownproperty.call

extracted_from_files

Domain
detected Domain: s.free

XIOC detected Domain: s.free

extracted_from_files

Domain
detected Domain: b.free

XIOC detected Domain: b.free

extracted_from_files

Domain
detected Domain: v.free

XIOC detected Domain: v.free

extracted_from_files

Domain
detected Domain: h.prototype.run

XIOC detected Domain: h.prototype.run

extracted_from_files

Domain
detected Domain: d.prototype.gb

XIOC detected Domain: d.prototype.gb

extracted_from_files

Domain
detected Domain: u.ha.lb

XIOC detected Domain: u.ha.lb

extracted_from_files

Domain
detected Domain: u.ha.read

XIOC detected Domain: u.ha.read

extracted_from_files

Domain
detected Domain: u.ga.pa

XIOC detected Domain: u.ga.pa

extracted_from_files

Domain
detected Domain: u.qa

XIOC detected Domain: u.qa

extracted_from_files

Domain
detected Domain: console.info

XIOC detected Domain: console.info

extracted_from_files

Domain
detected Domain: i.tty.xa.sb

XIOC detected Domain: i.tty.xa.sb

extracted_from_files

Domain
detected Domain: d.open

XIOC detected Domain: d.open

extracted_from_files

Domain
detected Domain: u.qa.pb.stream

XIOC detected Domain: u.qa.pb.stream

extracted_from_files

Domain
detected Domain: u.qa.link.stream

XIOC detected Domain: u.qa.link.stream

extracted_from_files

Domain
detected Domain: c.ma

XIOC detected Domain: c.ma

extracted_from_files

Domain
detected Domain: u.qa.file.stream

XIOC detected Domain: u.qa.file.stream

extracted_from_files

Domain
detected Domain: u.qa.dir.stream

XIOC detected Domain: u.qa.dir.stream

extracted_from_files

Domain
detected Domain: l.map

XIOC detected Domain: l.map

extracted_from_files

URL
detected URL: http://www.microsoft.com/pkiops/docs/primarycps.htm0@

XIOC detected URL: http://www.microsoft.com/pkiops/docs/primarycps.htm0@

extracted_from_files

Domain
detected Domain: xmlbuilder.build

XIOC detected Domain: xmlbuilder.build

extracted_from_files

Domain
detected Domain: array.prototype.slice.call

XIOC detected Domain: array.prototype.slice.call

extracted_from_files

Domain
detected Domain: i.node.ma

XIOC detected Domain: i.node.ma

extracted_from_files

Domain
detected Domain: i.link

XIOC detected Domain: i.link

extracted_from_files

Domain
detected Domain: i.name

XIOC detected Domain: i.name

extracted_from_files

Domain
detected Domain: i.id

XIOC detected Domain: i.id

extracted_from_files

Domain
detected Domain: a.dev

XIOC detected Domain: a.dev

extracted_from_files

Domain
detected Domain: h.ha.open

XIOC detected Domain: h.ha.open

extracted_from_files

Domain
detected Domain: i.ga.pa

XIOC detected Domain: i.ga.pa

extracted_from_files

Domain
detected Domain: h.va

XIOC detected Domain: h.va

extracted_from_files

Domain
detected Domain: i.ha.open

XIOC detected Domain: i.ha.open

extracted_from_files

Domain
detected Domain: c.parent.id

XIOC detected Domain: c.parent.id

extracted_from_files

Domain
detected Domain: i.parent.id

XIOC detected Domain: i.parent.id

extracted_from_files

Domain
detected Domain: a.sa

XIOC detected Domain: a.sa

extracted_from_files

Domain
detected Domain: q.name

XIOC detected Domain: q.name

extracted_from_files

Domain
detected Domain: y.name

XIOC detected Domain: y.name

extracted_from_files

Domain
detected Domain: a.ga

XIOC detected Domain: a.ga

extracted_from_files

Domain
detected Domain: this.ga

XIOC detected Domain: this.ga

extracted_from_files

Domain
detected Domain: this.va

XIOC detected Domain: this.va

extracted_from_files

Domain
detected Domain: d.dev

XIOC detected Domain: d.dev

extracted_from_files

Domain
detected Domain: i.ha.read

XIOC detected Domain: i.ha.read

extracted_from_files

Domain
detected Domain: h.min.call

XIOC detected Domain: h.min.call

extracted_from_files

Domain
detected Domain: performance.now

XIOC detected Domain: performance.now

extracted_from_files

Domain
detected Domain: w.name

XIOC detected Domain: w.name

extracted_from_files

Domain
detected Domain: pe.name

XIOC detected Domain: pe.name

extracted_from_files

Domain
detected Domain: g.ha.bb

XIOC detected Domain: g.ha.bb

extracted_from_files

Domain
detected Domain: g.name

XIOC detected Domain: g.name

extracted_from_files

Domain
detected Domain: a.name

XIOC detected Domain: a.name

extracted_from_files

Domain
detected Domain: d.na

XIOC detected Domain: d.na

extracted_from_files

Domain
detected Domain: d.ma

XIOC detected Domain: d.ma

extracted_from_files

Domain
detected Domain: d.la

XIOC detected Domain: d.la

extracted_from_files

Domain
detected Domain: d.ga

XIOC detected Domain: d.ga

extracted_from_files

Domain
detected Domain: d.ca

XIOC detected Domain: d.ca

extracted_from_files

Domain
detected Domain: d.ba

XIOC detected Domain: d.ba

extracted_from_files

Domain
detected Domain: x.name

XIOC detected Domain: x.name

extracted_from_files

Domain
detected Domain: g.search

XIOC detected Domain: g.search

extracted_from_files

Domain
detected Domain: d.za

XIOC detected Domain: d.za

extracted_from_files

Domain
detected Domain: d.va

XIOC detected Domain: d.va

extracted_from_files

Domain
detected Domain: d.ua

XIOC detected Domain: d.ua

extracted_from_files

Domain
detected Domain: d.sa

XIOC detected Domain: d.sa

extracted_from_files

Domain
detected Domain: d.qa

XIOC detected Domain: d.qa

extracted_from_files

Domain
detected Domain: d.pa

XIOC detected Domain: d.pa

extracted_from_files

Domain
detected Domain: t.map

XIOC detected Domain: t.map

extracted_from_files

Domain
detected Domain: e.report

XIOC detected Domain: e.report

extracted_from_files

Domain
detected Domain: cannot.create.directory

XIOC detected Domain: cannot.create.directory

extracted_from_files

Domain
detected Domain: in.extensions.getextension.name

XIOC detected Domain: in.extensions.getextension.name

extracted_from_files

Domain
detected Domain: dt.prototype.build

XIOC detected Domain: dt.prototype.build

extracted_from_files

Domain
detected Domain: s.search

XIOC detected Domain: s.search

extracted_from_files

Domain
detected Domain: o.data

XIOC detected Domain: o.data

extracted_from_files

Domain
detected Domain: o.map

XIOC detected Domain: o.map

extracted_from_files

Domain
detected Domain: n.map

XIOC detected Domain: n.map

extracted_from_files

Domain
detected Domain: e.directory

XIOC detected Domain: e.directory

extracted_from_files

Domain
detected Domain: r.page

XIOC detected Domain: r.page

extracted_from_files

Domain
detected Domain: x.configurationtarget.global

XIOC detected Domain: x.configurationtarget.global

extracted_from_files

Domain
detected Domain: me.configurationtarget.global

XIOC detected Domain: me.configurationtarget.global

extracted_from_files

Domain
detected Domain: s.preferredgenerator.name

XIOC detected Domain: s.preferredgenerator.name

extracted_from_files

Domain
detected Domain: e.map

XIOC detected Domain: e.map

extracted_from_files

Domain
detected Domain: this.qtselectbutton.show

XIOC detected Domain: this.qtselectbutton.show

extracted_from_files

Domain
detected Domain: super.show

XIOC detected Domain: super.show

extracted_from_files

Domain
detected Domain: this.button.show

XIOC detected Domain: this.button.show

extracted_from_files

Domain
detected Domain: n.viewcolumn.one

XIOC detected Domain: n.viewcolumn.one

extracted_from_files

Domain
detected Domain: p.info

XIOC detected Domain: p.info

extracted_from_files

Domain
detected Domain: x.viewcolumn.one

XIOC detected Domain: x.viewcolumn.one

extracted_from_files

URL
detected URL: https://gitee.com/openkylin/ide-qt-support/releases

XIOC detected URL: https://gitee.com/openkylin/ide-qt-support/releases

extracted_from_files

URL
detected URL: http://www.microsoft.com/PKI/docs/CPS/default.htm0@

XIOC detected URL: http://www.microsoft.com/PKI/docs/CPS/default.htm0@

extracted_from_files

Domain
detected Domain: onchangekit.fire

XIOC detected Domain: onchangekit.fire

extracted_from_files

Domain
detected Domain: u.map

XIOC detected Domain: u.map

extracted_from_files

Domain
detected Domain: o.show

XIOC detected Domain: o.show

extracted_from_files

Domain
detected Domain: l.name

XIOC detected Domain: l.name

extracted_from_files

Domain
detected Domain: filedatatable.data

XIOC detected Domain: filedatatable.data

extracted_from_files

Domain
detected Domain: foldertable.name

XIOC detected Domain: foldertable.name

extracted_from_files

Domain
detected Domain: m.map

XIOC detected Domain: m.map

extracted_from_files

Domain
detected Domain: filenametable.name

XIOC detected Domain: filenametable.name

extracted_from_files

Domain
detected Domain: activeview.show

XIOC detected Domain: activeview.show

extracted_from_files

Domain
detected Domain: vscode-cdn.net

XIOC detected Domain: vscode-cdn.net

extracted_from_files

Domain
detected Domain: ondiddispose.fire

XIOC detected Domain: ondiddispose.fire

extracted_from_files

URL
detected URL: http://www.microsoft.com0

XIOC detected URL: http://www.microsoft.com0

extracted_from_files

URL
detected URL: http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl0Z

XIOC detected URL: http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl0Z

extracted_from_files

URL
detected URL: http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z

XIOC detected URL: http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl0Z

extracted_from_files

Domain
detected Domain: vscode.open

XIOC detected Domain: vscode.open

extracted_from_files

Domain
detected Domain: l.report

XIOC detected Domain: l.report

extracted_from_files

Domain
detected Domain: filedatatable.id

XIOC detected Domain: filedatatable.id

extracted_from_files

Domain
detected Domain: foldertable.id

XIOC detected Domain: foldertable.id

extracted_from_files

Domain
detected Domain: r.space

XIOC detected Domain: r.space

extracted_from_files

Domain
detected Domain: r.menu

XIOC detected Domain: r.menu

extracted_from_files

Domain
detected Domain: l.property

XIOC detected Domain: l.property

extracted_from_files

Domain
detected Domain: x.next

XIOC detected Domain: x.next

extracted_from_files

Domain
detected Domain: g.call

XIOC detected Domain: g.call

extracted_from_files

Domain
detected Domain: n.fast

XIOC detected Domain: n.fast

extracted_from_files

Domain
detected Domain: e.show

XIOC detected Domain: e.show

extracted_from_files

Domain
detected Domain: a.fr

XIOC detected Domain: a.fr

extracted_from_files

Domain
detected Domain: t.data

XIOC detected Domain: t.data

extracted_from_files

Domain
detected Domain: this.click

XIOC detected Domain: this.click

extracted_from_files

Domain
detected Domain: n.search

XIOC detected Domain: n.search

extracted_from_files

Domain
detected Domain: z.properties

XIOC detected Domain: z.properties

extracted_from_files

Domain
detected Domain: r.properties

XIOC detected Domain: r.properties

extracted_from_files

Domain
detected Domain: r.tab

XIOC detected Domain: r.tab

extracted_from_files

Domain
detected Domain: e.host

XIOC detected Domain: e.host

extracted_from_files

Domain
detected Domain: e.property

XIOC detected Domain: e.property

extracted_from_files

Domain
detected Domain: w.call

XIOC detected Domain: w.call

extracted_from_files

Domain
detected Domain: s.call

XIOC detected Domain: s.call

extracted_from_files

Domain
detected Domain: q.page

XIOC detected Domain: q.page

extracted_from_files

Domain
detected Domain: a.gq

XIOC detected Domain: a.gq

extracted_from_files

Domain
detected Domain: a.qa

XIOC detected Domain: a.qa

extracted_from_files

Domain
detected Domain: t.sv

XIOC detected Domain: t.sv

extracted_from_files

Domain
detected Domain: source.java

XIOC detected Domain: source.java

extracted_from_files

Domain
detected Domain: 0.lv

XIOC detected Domain: 0.lv

extracted_from_files

Domain
detected Domain: kylinos.cn

XIOC detected Domain: kylinos.cn

extracted_from_files

Domain
detected Domain: n.data

XIOC detected Domain: n.data

extracted_from_files

Domain
detected Domain: l.properties

XIOC detected Domain: l.properties

extracted_from_files

Domain
detected Domain: t.style

XIOC detected Domain: t.style

extracted_from_files

Domain
detected Domain: changelog.md

XIOC detected Domain: changelog.md

extracted_from_files

Domain
detected Domain: readme.md

XIOC detected Domain: readme.md

extracted_from_files

Domain
detected Domain: microsoft.visualstudio.services.links.support

XIOC detected Domain: microsoft.visualstudio.services.links.support

extracted_from_files

Domain
detected Domain: w.show

XIOC detected Domain: w.show

extracted_from_files

Domain
detected Domain: crl.microsoft.com

XIOC detected Domain: crl.microsoft.com

extracted_from_files

Domain
detected Domain: www.microsoft.com

XIOC detected Domain: www.microsoft.com

extracted_from_files

Domain
detected Domain: schemas.microsoft.com

XIOC detected Domain: schemas.microsoft.com

extracted_from_files

URL
detected URL: https://github.com/microsoft/vscode-cmake-tools

XIOC detected URL: https://github.com/microsoft/vscode-cmake-tools

extracted_from_files

URL
detected URL: https://gitee.com/openKylin/ide-qt-support/issues)

XIOC detected URL: https://gitee.com/openKylin/ide-qt-support/issues)

extracted_from_files

URL
detected URL: https://gitee.com/openkylin/ide-qt-support/raw/master/res/demo.gif)

XIOC detected URL: https://gitee.com/openkylin/ide-qt-support/raw/master/res/demo.gif)

extracted_from_files

URL
detected URL: http://schemas.openxmlformats.org/package/2006/content-types

XIOC detected URL: http://schemas.openxmlformats.org/package/2006/content-types

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

URL
detected URL: https://gitee.com/openKylin/ide-qt-support

XIOC detected URL: https://gitee.com/openKylin/ide-qt-support

extracted_from_files

URL
detected URL: https://*.vscode-cdn.net

XIOC detected URL: https://*.vscode-cdn.net

extracted_from_files

URL
detected URL: https://github.com/jprichardson/node-fs-extra/issues/269

XIOC detected URL: https://github.com/jprichardson/node-fs-extra/issues/269

extracted_from_files

URL
detected URL: http://fontello.com

XIOC detected URL: http://fontello.com

extracted_from_files

URL
detected URL: http://www.w3.org/2000/svg

XIOC detected URL: http://www.w3.org/2000/svg

extracted_from_files

URL
detected URL: https://github.com/danvratil/vscode-qtdoc

XIOC detected URL: https://github.com/danvratil/vscode-qtdoc

extracted_from_files

URL
detected URL: https://schemas.microsoft.com/SMI/2016/WindowsSettings

XIOC detected URL: https://schemas.microsoft.com/SMI/2016/WindowsSettings

extracted_from_files

URL
detected URL: http://www.w3.org/1999/xlink

XIOC detected URL: http://www.w3.org/1999/xlink

extracted_from_files

URL
detected URL: http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd

XIOC detected URL: http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd

extracted_from_files

URL
detected URL: https://github.com/atom/language-xml/commit/7bc75dfe779ad5b35d9bf4013d9181864358cb49

XIOC detected URL: https://github.com/atom/language-xml/commit/7bc75dfe779ad5b35d9bf4013d9181864358cb49

extracted_from_files

URL
detected URL: https://github.com/atom/language-xml/blob/master/grammars/xml.cson

XIOC detected URL: https://github.com/atom/language-xml/blob/master/grammars/xml.cson

extracted_from_files

Domain
detected Domain: this.show

XIOC detected Domain: this.show

extracted_from_files

Domain
detected Domain: b.name

XIOC detected Domain: b.name

extracted_from_files

Domain
detected Domain: n.id

XIOC detected Domain: n.id

extracted_from_files

Domain
detected Domain: isqtproject.fire

XIOC detected Domain: isqtproject.fire

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Qt Support is a Visual Studio Code Marketplace extension published by Kylin-IDE Team. Version 0.4.3 has been analyzed by the Risky Plugins security platform, receiving a risk score of 56.97/100 (MEDIUM risk) based on 392 security findings.

Risk Assessment

This extension presents moderate security risk. Several findings were detected that may warrant attention. Users should carefully review the permissions and findings before installation.

Findings Breakdown

  • High: 84 finding(s)
  • Medium: 303 finding(s)
  • Low: 5 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Qt Support is published by Kylin-IDE Team on the Visual Studio Code Marketplace marketplace. The extension has approximately 7K users.

Recommendation

Exercise caution with this extension. Review the detailed findings and ensure the requested permissions align with the extension's stated functionality before installation.

Frequently Asked Questions