Is "CodeLang" on VS Code Marketplace Safe to Install?

yangpan · vscode · v1.6.0

Risk Assessment

Pending
0
out of 100
MINIMAL

0 security findings detected across all analyzers

VS Code extension analyzed via package manifest and static code analysis

No Threats Detected

This extension passed all security checks

No Findings

All security checks passed

AI Security Report

AI Security Analysis: CodeLang

Analysis generated: 2025-12-12T23:53:57+13:00
Model: gemini-3-pro-preview


Quick Facts

Property Value
UUID 5ac058d0-8f04-5986-b79e-d97472f14f5c
Type vscode
Version 1.6.0
Users 8
Risk Score 100.0/100 (CRITICAL)
Malware Detected ⚠️ Yes
Secrets Exposed ✅ No
Critical Vulns ✅ No

AI Analysis

Executive Summary

The "CodeLang" VS Code extension represents a CRITICAL security threat and should be considered malicious. With a perfect risk score of 100/100, an unverified publisher, and only 8 users, this extension exhibits multiple high-confidence indicators of malware, including obfuscated code, system command execution, and cryptographic operations triggered immediately upon installation. It is highly recommended to block this extension immediately and investigate any endpoints where it has been installed.

Threat Assessment

The security posture of "CodeLang" is non-existent; it appears to be an active threat vector rather than a functional tool.

  • Supply Chain Risk: The publisher "yangpan" is unverified, and the extension has a negligible user base (8 users). This profile is consistent with "typosquatting" or malicious prototyping, where attackers upload extensions with generic names to catch unwary developers.
  • Malicious Behavior Patterns: The analysis detected 4,821 malware signatures. The most concerning pattern is the repeated presence of postinstall triggers. In the Node.js/VS Code ecosystem, postinstall scripts run automatically as soon as the package is installed. The findings indicate these scripts attempt to execute system commands, manipulate files, and perform cryptographic operations (often associated with cryptojacking or ransomware).
  • Obfuscation: The presence of postinstall_obfuscation and NoUseEval indicates active attempts to hide the code's logic from analysis, a common tactic for malware to evade static detection.
  • Anomalous Volume of Findings: The total of 18,162 findings (including 13,136 IOCs) is statistically abnormal for a legitimate extension. This suggests the extension may contain a massive payload of malicious indicators, or it is heavily infected with complex malware families.

Risk Justification

The calculated risk score of 100.0/100 is fully justified and accurate based on the provided data:

  1. Severity of Indicators: The presence of "High" severity malware signatures specifically targeting the postinstall phase indicates an intent to compromise the host system immediately without user interaction beyond installation.
  2. Lack of Trust: Zero trust score, unverified publisher, and low install count provide no mitigating reputation factors.
  3. Capabilities: The combination of file manipulation, system command execution, and network activity creates a complete kill chain for remote code execution (RCE) and data exfiltration.

Key Findings

  • Post-Install Execution Chains (Critical): Multiple YARA matches (postinstall_system_command, postinstall_file_manipulation) indicate the extension runs shell commands immediately after installation. This is the primary vector for infection.
  • Cryptographic Operations: The postinstall_crypto_operations finding suggests the extension may be attempting to install a cryptominer or encrypt files (ransomware behavior).
  • Code Obfuscation: Findings for postinstall_obfuscation and NoUseEval confirm the code is intentionally hidden, preventing easy manual review and suggesting malicious intent.
  • Massive IOC Count: The extension contains over 13,000 Indicators of Compromise (IOCs). While this could theoretically be a blocklist in a security tool, given the context of the other findings, it is more likely associated with malicious infrastructure or a large-scale attack framework.

Recommendations

  1. Immediate Block: Blacklist the extension UUID 5ac058d0-8f04-5986-b79e-d97472f14f5c and publisher "yangpan" in your organization's VS Code extension management policy.
  2. Uninstall and Isolate: If this extension is found on any developer workstations, immediately uninstall it. Isolate the machine from the network, as the postinstall scripts likely executed arbitrary code.
  3. Incident Response: Treat any installation of this extension as a confirmed compromise. Review system logs for unusual shell commands, unexpected network connections, or high CPU usage (indicative of cryptomining) occurring at the timestamp of installation.
  4. Credential Rotation: Because the extension has file manipulation and system command capabilities, assume all secrets (SSH keys, API tokens, AWS credentials) stored on the affected machine are compromised. Rotate them immediately.

Mitigation Strategies

There are no viable mitigation strategies for using this extension safely.

Due to the presence of obfuscated postinstall scripts that execute system commands, the risk cannot be mitigated by restricting network access or permissions alone. The extension must not be used under any circumstances.

Confidence Assessment

Confidence Level: HIGH (80%)

The analysis is based on strong heuristic matches (YARA rules) that specifically target known malicious patterns in the Node/JS ecosystem.

  • Supporting Factors: The combination of postinstall triggers, obfuscation, and an unverified/low-reputation publisher creates a coherent picture of a malicious extension.
  • Caveat: The extremely high number of IOCs (13k) is unusual. There is a slight possibility (low probability) that this is a poorly constructed "security research" tool containing a database of malware signatures, which is triggering the scanner. However, without a verified publisher or documentation, it must be treated as hostile.

Disclaimer

This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.

Frequently Asked Questions