Is "Cell Notifier" on VS Code Marketplace Safe to Install?
A VS Code Extension to instantly notify users about the execution status of Jupyter cells.
Risk Assessment
Analyzed29739 security findings detected across all analyzers
VS Code extension analyzed via package manifest and static code analysis
Severity Breakdown
Finding Categories
YARA Rules Matched
18 rules(1000 hits)About This Extension
Detailed Findings
1000 totalYARA Rule Matches
18 rulesAI Security Report
AI Security Analysis: Cell Notifier
Analysis generated: 2025-12-11T23:10:02+13:00
Model: gemini-3-pro-preview
Quick Facts
| Property | Value |
|---|---|
| UUID | 8185505f-5afd-5b3f-bfdc-bf4ad02b3daf |
| Type | vscode |
| Version | 1.0.0 |
| Users | 353 |
| Risk Score | 100.0/100 (CRITICAL) |
| Malware Detected | ⚠️ Yes |
| Secrets Exposed | ✅ No |
| Critical Vulns | ✅ No |
AI Analysis
Here is the security analysis for the "Cell Notifier" VS Code extension.
Executive Summary
The "Cell Notifier" VS Code extension presents a CRITICAL security risk. While the extension aims to provide notifications for Jupyter cell execution, the automated analysis has flagged an exceptionally high number of malware signatures (over 9,800) and suspicious behaviors, including crypto operations, file manipulation, and system command execution. The publisher is unverified, and the sheer volume of high-severity findings suggests either a heavily compromised codebase or a malicious supply chain attack. Immediate removal and avoidance are recommended.
Threat Assessment
The security posture of this extension is extremely poor based on the provided telemetry.
- Malware Signatures: The analysis detected 9,805 high-severity malware signatures. The specific YARA rules triggered (
postinstall_crypto_operations,postinstall_file_manipulation,postinstall_system_command) are highly indicative of malicious "post-install" scripts often found in supply chain attacks or malware droppers. - Suspicious Capabilities: The findings indicate the extension attempts to:
- Execute system commands (
postinstall_system_command). - Manipulate files on the host system (
postinstall_file_manipulation). - Perform cryptographic operations (
postinstall_crypto_operations), which is unusual for a simple notification tool and often associated with ransomware or coin miners. - Establish network communication (
postinstall_network_communication).
- Execute system commands (
- Publisher Trust: The publisher "Kireshvanth B" is unverified. Combined with the low user count (353) and the high volume of findings, this lacks the community trust or reputation to offset the technical red flags.
- Code Quality/Obfuscation: The presence of
NoUseWeakRandomsuggests poor cryptographic practices, but this is overshadowed by the malicious indicators.
Risk Justification
The Risk Score of 100/100 (CRITICAL) is fully justified and potentially conservative given the data.
- Severity of Findings: The findings are not merely bad coding practices; they are signatures specifically designed to detect malicious behavior (post-install scripts executing commands and crypto operations).
- Volume of Findings: A total of 29,739 findings is astronomically high for a simple utility extension. This suggests the extension may include a massive dependency tree that is compromised, or it is bundling malware directly.
- Nature of Threat: The combination of file manipulation, network communication, and system command execution creates a "Remote Code Execution" (RCE) equivalent scenario on the developer's machine.
Key Findings
- Post-Install Script Abuse (Critical): Multiple YARA matches for
postinstall_system_commandandpostinstall_file_manipulationindicate the extension runs arbitrary code immediately after installation, a common vector for malware installation. - Cryptographic Anomalies (High): The
postinstall_crypto_operationsfinding suggests the extension is performing encryption/decryption tasks that are unrelated to its stated purpose of "notifying users," raising concerns about ransomware or hidden communication channels. - Network Activity (High): 232 network findings combined with
postinstall_network_communicationsuggest the extension is phoning home, potentially to a Command & Control (C2) server or to exfiltrate data. - Weak Randomness (Medium): The
NoUseWeakRandomfinding indicates the use of insecure random number generators (likeMath.random()instead ofcrypto.getRandomValues()), though this is a secondary concern compared to the malware indicators.
Recommendations
- Immediate Removal: Uninstall the "Cell Notifier" extension immediately from all VS Code instances.
- Incident Response: If this extension was installed in a corporate environment, treat the affected machine as potentially compromised. Initiate incident response procedures to check for unauthorized outbound network traffic or unexpected background processes.
- Credential Rotation: As a precaution, rotate any API keys, SSH keys, or cloud credentials that were accessible in the VS Code environment while this extension was installed.
- Blocklist: Add the extension UUID (
8185505f-5afd-5b3f-bfdc-bf4ad02b3daf) to the organization's VS Code extension blocklist to prevent future installation. - Report: Report the extension to the VS Code Marketplace for abuse/malware review.
Mitigation Strategies
There is no safe way to use this extension in its current state.
The risk is intrinsic to the code signatures detected. No configuration change or firewall rule can reliably mitigate the risk of an extension that demonstrates capabilities of arbitrary file manipulation and system command execution upon installation. Users requiring Jupyter cell notifications should seek alternative extensions from verified publishers (e.g., Microsoft's official Jupyter extension or others with high trust scores).
Confidence Assessment
Confidence Level: 80%
While YARA rules can generate false positives (e.g., a legitimate build script might look like a malicious post-install script), the volume and combination of these specific findings make a false positive scenario highly unlikely. A legitimate extension would not typically trigger nearly 10,000 high-severity malware signatures involving crypto operations and system commands. The only reason confidence is not 100% is the lack of manual code review to confirm the exact payload, but the automated signals are strong enough to warrant a Critical rating.
Disclaimer
This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace
Azure Resource Manager (ARM) Tools
Microsoft
EveryOps Extension
EveryOps-ai
SayDeploy - Copilot Assistant
LunarWerx
AVAP API Release Manager
AVAP Framework
Copilot MCP + Agent Skills Manager
Automata Labs
Code Guardian
DreamersRedemption