Is "AVAP API Release Manager" on VS Code Marketplace Safe to Install?
VerifiedAVAP API Release Manager
Risk Assessment
Analyzed22616 security findings detected across all analyzers
VS Code extension analyzed via package manifest and static code analysis
Severity Breakdown
Finding Categories
YARA Rules Matched
16 rules(1000 hits)About This Extension
Detailed Findings
1000 totalYARA Rule Matches
16 rulesAI Security Report
AI Security Analysis: AVAP API Release Manager
Analysis generated: 2025-12-12T00:55:28+13:00
Model: gemini-3-pro-preview
Quick Facts
| Property | Value |
|---|---|
| UUID | 66baa5f7-8df1-591c-93af-032ff4aa7c63 |
| Type | vscode |
| Version | 1.30.141 |
| Users | 54 |
| Risk Score | 100.0/100 (CRITICAL) |
| Malware Detected | ⚠️ Yes |
| Secrets Exposed | ✅ No |
| Critical Vulns | ✅ No |
AI Analysis
Executive Summary
The "AVAP API Release Manager" VS Code extension represents a CRITICAL security threat and should be immediately removed or blocked from all organizational environments. The analysis detected over 3,000 high-severity indicators consistent with malicious supply chain attacks, specifically utilizing "post-install" scripts to download external files, execute system commands, and obfuscate code. The combination of an unverified publisher, low user count, and aggressive system-level behaviors indicates a high probability that this extension acts as a malware dropper or backdoor.
Threat Assessment
The security posture of this extension is extremely poor, exhibiting behaviors typical of malicious software rather than a standard developer tool.
- Supply Chain Attack Vector: The prevalence of
postinstall_YARA matches is the most concerning aspect. In the Node.js/VS Code ecosystem, post-install scripts execute automatically as soon as the extension is installed. The findings indicate this script attempts to:- Download Files: Fetch payloads from external sources (
postinstall_file_download). - Execute Commands: Run shell commands on the host OS (
postinstall_system_command,UsingShellInterpreterWhenExecutingOSCommands). - Hide Activity: Use obfuscation to conceal the logic (
postinstall_obfuscation).
- Download Files: Fetch payloads from external sources (
- System Integrity Risk: The extension triggers rules for
file_manipulationandcrypto_operationswithin these scripts. This suggests it may attempt to modify system files or encrypt data (potentially ransomware-like behavior or credential exfiltration). - Anomalous Volume: The total finding count (22,616) is abnormally high. This suggests the extension likely bundles a massive number of dependencies (e.g., an accidental commit of
node_modules) or contains a highly complex, obfuscated payload structure that is triggering repeated signature matches.
Risk Justification
Risk Score: 100.0/100 (CRITICAL)
This score is fully justified and potentially conservative.
- Active Threat Indicators: Unlike extensions with passive vulnerabilities (e.g., XSS), this extension contains code signatures for active system manipulation and external payload delivery.
- Automation: The use of
postinstallhooks means user interaction is not required to trigger the malicious behavior beyond the initial installation. - Evasion Techniques: The presence of obfuscation (
postinstall_obfuscation) indicates an intentional effort to hide the code's purpose, which is rare in legitimate open-source extensions. - Lack of Trust: The publisher is unverified, and the user base is negligible (54 users), providing no community vetting or reputation.
Key Findings
- Post-Install Command Execution (High Severity): Multiple matches for
postinstall_system_commandandUsingShellInterpreterWhenExecutingOSCommands. This indicates the extension attempts to run arbitrary commands on the user's operating system immediately upon installation. - External Payload Delivery (High Severity): Findings for
postinstall_file_downloadandpostinstall_network_communicationsuggest the extension acts as a "dropper," fetching additional malicious code from the internet that was not included in the store package. - Code Obfuscation (High Severity): The
postinstall_obfuscationfinding implies the code is deliberately scrambled to prevent analysis. Legitimate extensions rarely obfuscate post-install scripts. - Cryptographic Operations (High Severity):
postinstall_crypto_operationssuggests the extension is performing encryption or decryption, which could be related to decrypting a malicious payload or encrypting user data.
Recommendations
- Immediate Removal: Uninstall this extension from all workstations immediately.
- Blocklist: Add the Extension UUID (
66baa5f7-8df1-591c-93af-032ff4aa7c63) to the organization's VS Code extension blocklist. - Incident Response: For any machine where this was installed:
- Review network logs for traffic occurring immediately after the extension installation timestamp.
- Scan the machine for persistence mechanisms (scheduled tasks, startup items) created by the post-install script.
- Consider the machine compromised and re-image if suspicious network traffic is confirmed.
- Credential Rotation: If the extension was installed on developer machines with access to production secrets or API keys, rotate those credentials immediately.
Mitigation Strategies
There are no safe mitigation strategies for using this extension.
Due to the nature of the findings (automatic execution of obfuscated system commands), the risk cannot be mitigated while keeping the extension installed. It must be removed.
Confidence Assessment
Confidence Level: 80% (High)
While YARA rules can sometimes generate false positives, the specific combination of findings here creates a distinct fingerprint of malware. A legitimate extension might trigger a "network communication" rule, but it is statistically improbable for a legitimate extension to trigger file_download, system_command, obfuscation, and crypto_operations simultaneously within a postinstall context. The only factor preventing 100% confidence is the lack of a manual code review to confirm the exact payload, but the automated signals are decisive enough to warrant immediate action.
Disclaimer
This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace
AVAP API Specs
AVAP Framework
AVAP API Source Control
AVAP Framework
AVAP DEV Extensions for Microsoft Visual Studio
AVAP Framework
AVAP Linter & Completion
AVAP Framework
AVAP Brunix
AVAP Framework
AVAP API Designer
AVAP Framework