Is "Cell Notifier" on VS Code Marketplace Safe to Install?

Kireshvanth B · vscode · v1.0.0

A VS Code Extension to instantly notify users about the execution status of Jupyter cells.

Risk Assessment

Analyzed
100
out of 100
CRITICAL

29739 security findings detected across all analyzers

VS Code extension analyzed via package manifest and static code analysis

Severity Breakdown

0
Critical
9805
High
19928
Medium
6
Low
0
Info

Finding Categories

1000
Malware Signatures

YARA Rules Matched

18 rules(1000 hits)
postinstall network communication postinstall registry modification postinstall file manipulation postinstall obfuscation postinstall environment access postinstall crypto operations postinstall system command DebuggerStatementsShouldNotBeUsed postinstall file download credential env files UsingCommandLineArguments NoUseWeakRandom postinstall persistence mechanism credential gcp credentials UsingShellInterpreterWhenExecutingOSCommands NoUseEval +2 more

About This Extension

A VS Code Extension to instantly notify users about the execution status of Jupyter cells.

Detailed Findings

1000 total

YARA Rule Matches

18 rules

AI Security Report

AI Security Analysis: Cell Notifier

Analysis generated: 2025-12-11T23:10:02+13:00
Model: gemini-3-pro-preview


Quick Facts

Property Value
UUID 8185505f-5afd-5b3f-bfdc-bf4ad02b3daf
Type vscode
Version 1.0.0
Users 353
Risk Score 100.0/100 (CRITICAL)
Malware Detected ⚠️ Yes
Secrets Exposed ✅ No
Critical Vulns ✅ No

AI Analysis

Here is the security analysis for the "Cell Notifier" VS Code extension.

Executive Summary

The "Cell Notifier" VS Code extension presents a CRITICAL security risk. While the extension aims to provide notifications for Jupyter cell execution, the automated analysis has flagged an exceptionally high number of malware signatures (over 9,800) and suspicious behaviors, including crypto operations, file manipulation, and system command execution. The publisher is unverified, and the sheer volume of high-severity findings suggests either a heavily compromised codebase or a malicious supply chain attack. Immediate removal and avoidance are recommended.

Threat Assessment

The security posture of this extension is extremely poor based on the provided telemetry.

  • Malware Signatures: The analysis detected 9,805 high-severity malware signatures. The specific YARA rules triggered (postinstall_crypto_operations, postinstall_file_manipulation, postinstall_system_command) are highly indicative of malicious "post-install" scripts often found in supply chain attacks or malware droppers.
  • Suspicious Capabilities: The findings indicate the extension attempts to:
    • Execute system commands (postinstall_system_command).
    • Manipulate files on the host system (postinstall_file_manipulation).
    • Perform cryptographic operations (postinstall_crypto_operations), which is unusual for a simple notification tool and often associated with ransomware or coin miners.
    • Establish network communication (postinstall_network_communication).
  • Publisher Trust: The publisher "Kireshvanth B" is unverified. Combined with the low user count (353) and the high volume of findings, this lacks the community trust or reputation to offset the technical red flags.
  • Code Quality/Obfuscation: The presence of NoUseWeakRandom suggests poor cryptographic practices, but this is overshadowed by the malicious indicators.

Risk Justification

The Risk Score of 100/100 (CRITICAL) is fully justified and potentially conservative given the data.

  • Severity of Findings: The findings are not merely bad coding practices; they are signatures specifically designed to detect malicious behavior (post-install scripts executing commands and crypto operations).
  • Volume of Findings: A total of 29,739 findings is astronomically high for a simple utility extension. This suggests the extension may include a massive dependency tree that is compromised, or it is bundling malware directly.
  • Nature of Threat: The combination of file manipulation, network communication, and system command execution creates a "Remote Code Execution" (RCE) equivalent scenario on the developer's machine.

Key Findings

  • Post-Install Script Abuse (Critical): Multiple YARA matches for postinstall_system_command and postinstall_file_manipulation indicate the extension runs arbitrary code immediately after installation, a common vector for malware installation.
  • Cryptographic Anomalies (High): The postinstall_crypto_operations finding suggests the extension is performing encryption/decryption tasks that are unrelated to its stated purpose of "notifying users," raising concerns about ransomware or hidden communication channels.
  • Network Activity (High): 232 network findings combined with postinstall_network_communication suggest the extension is phoning home, potentially to a Command & Control (C2) server or to exfiltrate data.
  • Weak Randomness (Medium): The NoUseWeakRandom finding indicates the use of insecure random number generators (like Math.random() instead of crypto.getRandomValues()), though this is a secondary concern compared to the malware indicators.

Recommendations

  1. Immediate Removal: Uninstall the "Cell Notifier" extension immediately from all VS Code instances.
  2. Incident Response: If this extension was installed in a corporate environment, treat the affected machine as potentially compromised. Initiate incident response procedures to check for unauthorized outbound network traffic or unexpected background processes.
  3. Credential Rotation: As a precaution, rotate any API keys, SSH keys, or cloud credentials that were accessible in the VS Code environment while this extension was installed.
  4. Blocklist: Add the extension UUID (8185505f-5afd-5b3f-bfdc-bf4ad02b3daf) to the organization's VS Code extension blocklist to prevent future installation.
  5. Report: Report the extension to the VS Code Marketplace for abuse/malware review.

Mitigation Strategies

There is no safe way to use this extension in its current state.

The risk is intrinsic to the code signatures detected. No configuration change or firewall rule can reliably mitigate the risk of an extension that demonstrates capabilities of arbitrary file manipulation and system command execution upon installation. Users requiring Jupyter cell notifications should seek alternative extensions from verified publishers (e.g., Microsoft's official Jupyter extension or others with high trust scores).

Confidence Assessment

Confidence Level: 80%

While YARA rules can generate false positives (e.g., a legitimate build script might look like a malicious post-install script), the volume and combination of these specific findings make a false positive scenario highly unlikely. A legitimate extension would not typically trigger nearly 10,000 high-severity malware signatures involving crypto operations and system commands. The only reason confidence is not 100% is the lack of manual code review to confirm the exact payload, but the automated signals are strong enough to warrant a Critical rating.


Disclaimer

This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.

Frequently Asked Questions