Is "DTK" on VS Code Marketplace Safe to Install?

shanzhenhua · vscode · v0.0.33

开发工具集(Develop Tool Kit)

Risk Assessment

Analyzed
100
out of 100
CRITICAL

32313 security findings detected across all analyzers

VS Code extension analyzed via package manifest and static code analysis

Severity Breakdown

0
Critical
5307
High
26998
Medium
8
Low
0
Info

Finding Categories

1000
Malware Signatures

YARA Rules Matched

16 rules(1000 hits)
postinstall file download credential env files postinstall obfuscation postinstall system command postinstall file manipulation postinstall network communication NoUseWeakRandom postinstall persistence mechanism postinstall environment access postinstall crypto operations postinstall registry modification DebuggerStatementsShouldNotBeUsed UsingCommandLineArguments NoUseEval ReadingTheStandardInput UsingShellInterpreterWhenExecutingOSCommands

About This Extension

开发工具集(Develop Tool Kit)

Detailed Findings

1000 total

YARA Rule Matches

16 rules

AI Security Report

AI Security Analysis: DTK

Analysis generated: 2025-12-11T22:49:06+13:00
Model: gemini-3-pro-preview


Quick Facts

Property Value
UUID c18f60e9-6511-5305-907f-6956dc72a726
Type vscode
Version 0.0.33
Users 291
Risk Score 100.0/100 (CRITICAL)
Malware Detected ⚠️ Yes
Secrets Exposed ✅ No
Critical Vulns ✅ No

AI Analysis

Executive Summary

The "DTK" (Develop Tool Kit) VS Code extension represents a CRITICAL security threat and should be immediately blocked and removed from all environments. The extension exhibits behaviors characteristic of a malicious "dropper" and system compromise tool, including attempts to establish persistence, modify the system registry, and execute arbitrary system commands immediately upon installation. With an unverified publisher and a massive volume of high-severity malware signatures, this extension poses an imminent risk of data exfiltration and total system compromise.

Threat Assessment

The analysis indicates that this extension is likely a vehicle for malware delivery rather than a legitimate development tool. The threat profile is defined by the following behaviors:

  • Supply Chain Attack Vector (Post-Install Scripts): The prevalence of postinstall_ signatures suggests the malicious code is designed to execute automatically as soon as the extension or its dependencies are installed. This is a common technique to bypass sandbox restrictions and execute code with the user's privileges before the user even interacts with the extension.
  • System Persistence & Modification: The presence of postinstall_persistence_mechanism and postinstall_registry_modification is highly alarming. Legitimate VS Code extensions rarely, if ever, need to modify the Windows Registry or establish persistence mechanisms (auto-start entries). This behavior is indicative of malware attempting to survive system reboots.
  • Dropper Behavior: The combination of postinstall_file_download and postinstall_network_communication suggests the extension acts as a "dropper." It likely connects to a Command & Control (C2) server to download and execute a second-stage payload (e.g., ransomware, cryptominer, or info-stealer).
  • Massive Code Obfuscation/Bloat: The sheer volume of findings (over 32,000) suggests the extension may contain a massive amount of obfuscated code or is bundling known malicious libraries, triggering thousands of heuristic matches.

Risk Justification

The calculated Risk Score of 100.0/100 is fully justified and accurate.

  • Severity of Indicators: The findings are not merely "vulnerabilities" (like XSS or weak encryption); they are malware signatures. The specific combination of Registry Modification + Persistence + File Download is the "unholy trinity" of malware behavior.
  • Publisher Trust: The publisher "shanzhenhua" is unverified and the extension has a generic description ("Develop Tool Kit") with low user counts, fitting the profile of a malicious actor testing a payload or targeting specific developers.
  • Immediate Execution: The risk is realized immediately upon installation due to the post-install scripts, leaving no window for safe evaluation by the user.

Key Findings

  • Persistence Mechanisms (High Severity): Multiple YARA matches for postinstall_persistence_mechanism indicate code designed to ensure the malicious payload restarts automatically when the computer reboots.
  • Registry Modification (High Severity): The postinstall_registry_modification finding suggests the extension attempts to alter the operating system's configuration database, potentially to lower security settings or hide its presence.
  • Unauthorized Network Activity (High Severity): postinstall_network_communication and postinstall_file_download indicate the extension attempts to reach external servers to fetch additional files without user consent.
  • Arbitrary Command Execution (High Severity): postinstall_system_command confirms the extension attempts to run shell commands on the host OS, granting it full control within the user's permission scope.

Recommendations

  1. Immediate Removal: Uninstall the "DTK" extension from all VS Code instances immediately.
  2. Blocklist Implementation: Add the Extension UUID (c18f60e9-6511-5305-907f-6956dc72a726) to the organization's VS Code extension blocklist to prevent future installation.
  3. Incident Response: For any machine where this extension was installed:
    • Isolate the machine from the network.
    • Scan for persistence mechanisms (e.g., check Startup folders, Run registry keys, Scheduled Tasks).
    • Review network logs for connections to unknown IPs/domains initiated around the time of installation.
  4. Credential Rotation: Assume compromise of any secrets (API keys, SSH keys, environment variables) accessible to the VS Code environment on affected machines. Rotate these credentials immediately.
  5. Report Abuse: Report the extension to the VS Code Marketplace for takedown.

Mitigation Strategies

There are no viable mitigation strategies for using this extension safely.

Due to the presence of post-install scripts that execute arbitrary system commands and modify the registry, the extension compromises the environment the moment it is installed. It cannot be sandboxed effectively within the standard VS Code environment. Do not use this extension.

Confidence Assessment

Confidence Level: 80% (High)

While I have not manually reverse-engineered the binary code, the automated analysis provides strong, convergent evidence. The specific combination of YARA rules triggering (Registry + Persistence + Download + Post-install) creates a distinct fingerprint of malicious activity that is extremely unlikely to be a false positive for a legitimate "Developer Tool Kit." The unverified publisher status further solidifies this assessment.


Disclaimer

This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.

Frequently Asked Questions