Is "CodeLang" on VS Code Marketplace Safe to Install?
Risk Assessment
Pending0 security findings detected across all analyzers
VS Code extension analyzed via package manifest and static code analysis
No Threats Detected
This extension passed all security checks
No Findings
All security checks passed
AI Security Report
AI Security Analysis: CodeLang
Analysis generated: 2025-12-12T23:53:57+13:00
Model: gemini-3-pro-preview
Quick Facts
| Property | Value |
|---|---|
| UUID | 5ac058d0-8f04-5986-b79e-d97472f14f5c |
| Type | vscode |
| Version | 1.6.0 |
| Users | 8 |
| Risk Score | 100.0/100 (CRITICAL) |
| Malware Detected | ⚠️ Yes |
| Secrets Exposed | ✅ No |
| Critical Vulns | ✅ No |
AI Analysis
Executive Summary
The "CodeLang" VS Code extension represents a CRITICAL security threat and should be considered malicious. With a perfect risk score of 100/100, an unverified publisher, and only 8 users, this extension exhibits multiple high-confidence indicators of malware, including obfuscated code, system command execution, and cryptographic operations triggered immediately upon installation. It is highly recommended to block this extension immediately and investigate any endpoints where it has been installed.
Threat Assessment
The security posture of "CodeLang" is non-existent; it appears to be an active threat vector rather than a functional tool.
- Supply Chain Risk: The publisher "yangpan" is unverified, and the extension has a negligible user base (8 users). This profile is consistent with "typosquatting" or malicious prototyping, where attackers upload extensions with generic names to catch unwary developers.
- Malicious Behavior Patterns: The analysis detected 4,821 malware signatures. The most concerning pattern is the repeated presence of
postinstalltriggers. In the Node.js/VS Code ecosystem,postinstallscripts run automatically as soon as the package is installed. The findings indicate these scripts attempt to execute system commands, manipulate files, and perform cryptographic operations (often associated with cryptojacking or ransomware). - Obfuscation: The presence of
postinstall_obfuscationandNoUseEvalindicates active attempts to hide the code's logic from analysis, a common tactic for malware to evade static detection. - Anomalous Volume of Findings: The total of 18,162 findings (including 13,136 IOCs) is statistically abnormal for a legitimate extension. This suggests the extension may contain a massive payload of malicious indicators, or it is heavily infected with complex malware families.
Risk Justification
The calculated risk score of 100.0/100 is fully justified and accurate based on the provided data:
- Severity of Indicators: The presence of "High" severity malware signatures specifically targeting the
postinstallphase indicates an intent to compromise the host system immediately without user interaction beyond installation. - Lack of Trust: Zero trust score, unverified publisher, and low install count provide no mitigating reputation factors.
- Capabilities: The combination of file manipulation, system command execution, and network activity creates a complete kill chain for remote code execution (RCE) and data exfiltration.
Key Findings
- Post-Install Execution Chains (Critical): Multiple YARA matches (
postinstall_system_command,postinstall_file_manipulation) indicate the extension runs shell commands immediately after installation. This is the primary vector for infection. - Cryptographic Operations: The
postinstall_crypto_operationsfinding suggests the extension may be attempting to install a cryptominer or encrypt files (ransomware behavior). - Code Obfuscation: Findings for
postinstall_obfuscationandNoUseEvalconfirm the code is intentionally hidden, preventing easy manual review and suggesting malicious intent. - Massive IOC Count: The extension contains over 13,000 Indicators of Compromise (IOCs). While this could theoretically be a blocklist in a security tool, given the context of the other findings, it is more likely associated with malicious infrastructure or a large-scale attack framework.
Recommendations
- Immediate Block: Blacklist the extension UUID
5ac058d0-8f04-5986-b79e-d97472f14f5cand publisher "yangpan" in your organization's VS Code extension management policy. - Uninstall and Isolate: If this extension is found on any developer workstations, immediately uninstall it. Isolate the machine from the network, as the
postinstallscripts likely executed arbitrary code. - Incident Response: Treat any installation of this extension as a confirmed compromise. Review system logs for unusual shell commands, unexpected network connections, or high CPU usage (indicative of cryptomining) occurring at the timestamp of installation.
- Credential Rotation: Because the extension has file manipulation and system command capabilities, assume all secrets (SSH keys, API tokens, AWS credentials) stored on the affected machine are compromised. Rotate them immediately.
Mitigation Strategies
There are no viable mitigation strategies for using this extension safely.
Due to the presence of obfuscated postinstall scripts that execute system commands, the risk cannot be mitigated by restricting network access or permissions alone. The extension must not be used under any circumstances.
Confidence Assessment
Confidence Level: HIGH (80%)
The analysis is based on strong heuristic matches (YARA rules) that specifically target known malicious patterns in the Node/JS ecosystem.
- Supporting Factors: The combination of
postinstalltriggers, obfuscation, and an unverified/low-reputation publisher creates a coherent picture of a malicious extension. - Caveat: The extremely high number of IOCs (13k) is unusual. There is a slight possibility (low probability) that this is a poorly constructed "security research" tool containing a database of malware signatures, which is triggering the scanner. However, without a verified publisher or documentation, it must be treated as hostile.
Disclaimer
This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace