Is "AVAP API Release Manager" on VS Code Marketplace Safe to Install?

Verified
AVAP Framework · vscode · v1.30.141

AVAP API Release Manager

Risk Assessment

Analyzed
100
out of 100
CRITICAL

22616 security findings detected across all analyzers

VS Code extension analyzed via package manifest and static code analysis

Severity Breakdown

0
Critical
3009
High
19597
Medium
10
Low
0
Info

Finding Categories

1000
Malware Signatures

YARA Rules Matched

16 rules(1000 hits)
postinstall file manipulation postinstall network communication postinstall obfuscation postinstall system command postinstall file download NoUseWeakRandom postinstall registry modification postinstall environment access postinstall persistence mechanism postinstall crypto operations credential env files NoDisableSanitizeHtml UsingCommandLineArguments UsingShellInterpreterWhenExecutingOSCommands credential ssh keys APT1 WEBC2 Y21K

About This Extension

AVAP API Release Manager

Detailed Findings

1000 total

YARA Rule Matches

16 rules

AI Security Report

AI Security Analysis: AVAP API Release Manager

Analysis generated: 2025-12-12T00:55:28+13:00
Model: gemini-3-pro-preview


Quick Facts

Property Value
UUID 66baa5f7-8df1-591c-93af-032ff4aa7c63
Type vscode
Version 1.30.141
Users 54
Risk Score 100.0/100 (CRITICAL)
Malware Detected ⚠️ Yes
Secrets Exposed ✅ No
Critical Vulns ✅ No

AI Analysis

Executive Summary

The "AVAP API Release Manager" VS Code extension represents a CRITICAL security threat and should be immediately removed or blocked from all organizational environments. The analysis detected over 3,000 high-severity indicators consistent with malicious supply chain attacks, specifically utilizing "post-install" scripts to download external files, execute system commands, and obfuscate code. The combination of an unverified publisher, low user count, and aggressive system-level behaviors indicates a high probability that this extension acts as a malware dropper or backdoor.

Threat Assessment

The security posture of this extension is extremely poor, exhibiting behaviors typical of malicious software rather than a standard developer tool.

  • Supply Chain Attack Vector: The prevalence of postinstall_ YARA matches is the most concerning aspect. In the Node.js/VS Code ecosystem, post-install scripts execute automatically as soon as the extension is installed. The findings indicate this script attempts to:
    1. Download Files: Fetch payloads from external sources (postinstall_file_download).
    2. Execute Commands: Run shell commands on the host OS (postinstall_system_command, UsingShellInterpreterWhenExecutingOSCommands).
    3. Hide Activity: Use obfuscation to conceal the logic (postinstall_obfuscation).
  • System Integrity Risk: The extension triggers rules for file_manipulation and crypto_operations within these scripts. This suggests it may attempt to modify system files or encrypt data (potentially ransomware-like behavior or credential exfiltration).
  • Anomalous Volume: The total finding count (22,616) is abnormally high. This suggests the extension likely bundles a massive number of dependencies (e.g., an accidental commit of node_modules) or contains a highly complex, obfuscated payload structure that is triggering repeated signature matches.

Risk Justification

Risk Score: 100.0/100 (CRITICAL)

This score is fully justified and potentially conservative.

  • Active Threat Indicators: Unlike extensions with passive vulnerabilities (e.g., XSS), this extension contains code signatures for active system manipulation and external payload delivery.
  • Automation: The use of postinstall hooks means user interaction is not required to trigger the malicious behavior beyond the initial installation.
  • Evasion Techniques: The presence of obfuscation (postinstall_obfuscation) indicates an intentional effort to hide the code's purpose, which is rare in legitimate open-source extensions.
  • Lack of Trust: The publisher is unverified, and the user base is negligible (54 users), providing no community vetting or reputation.

Key Findings

  • Post-Install Command Execution (High Severity): Multiple matches for postinstall_system_command and UsingShellInterpreterWhenExecutingOSCommands. This indicates the extension attempts to run arbitrary commands on the user's operating system immediately upon installation.
  • External Payload Delivery (High Severity): Findings for postinstall_file_download and postinstall_network_communication suggest the extension acts as a "dropper," fetching additional malicious code from the internet that was not included in the store package.
  • Code Obfuscation (High Severity): The postinstall_obfuscation finding implies the code is deliberately scrambled to prevent analysis. Legitimate extensions rarely obfuscate post-install scripts.
  • Cryptographic Operations (High Severity): postinstall_crypto_operations suggests the extension is performing encryption or decryption, which could be related to decrypting a malicious payload or encrypting user data.

Recommendations

  1. Immediate Removal: Uninstall this extension from all workstations immediately.
  2. Blocklist: Add the Extension UUID (66baa5f7-8df1-591c-93af-032ff4aa7c63) to the organization's VS Code extension blocklist.
  3. Incident Response: For any machine where this was installed:
    • Review network logs for traffic occurring immediately after the extension installation timestamp.
    • Scan the machine for persistence mechanisms (scheduled tasks, startup items) created by the post-install script.
    • Consider the machine compromised and re-image if suspicious network traffic is confirmed.
  4. Credential Rotation: If the extension was installed on developer machines with access to production secrets or API keys, rotate those credentials immediately.

Mitigation Strategies

There are no safe mitigation strategies for using this extension.
Due to the nature of the findings (automatic execution of obfuscated system commands), the risk cannot be mitigated while keeping the extension installed. It must be removed.

Confidence Assessment

Confidence Level: 80% (High)

While YARA rules can sometimes generate false positives, the specific combination of findings here creates a distinct fingerprint of malware. A legitimate extension might trigger a "network communication" rule, but it is statistically improbable for a legitimate extension to trigger file_download, system_command, obfuscation, and crypto_operations simultaneously within a postinstall context. The only factor preventing 100% confidence is the lack of a manual code review to confirm the exact payload, but the automated signals are decisive enough to warrant immediate action.


Disclaimer

This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.

Frequently Asked Questions