Is "DTK" on VS Code Marketplace Safe to Install?
开发工具集(Develop Tool Kit)
Risk Assessment
Analyzed32313 security findings detected across all analyzers
VS Code extension analyzed via package manifest and static code analysis
Severity Breakdown
Finding Categories
YARA Rules Matched
16 rules(1000 hits)About This Extension
Detailed Findings
1000 totalYARA Rule Matches
16 rulesAI Security Report
AI Security Analysis: DTK
Analysis generated: 2025-12-11T22:49:06+13:00
Model: gemini-3-pro-preview
Quick Facts
| Property | Value |
|---|---|
| UUID | c18f60e9-6511-5305-907f-6956dc72a726 |
| Type | vscode |
| Version | 0.0.33 |
| Users | 291 |
| Risk Score | 100.0/100 (CRITICAL) |
| Malware Detected | ⚠️ Yes |
| Secrets Exposed | ✅ No |
| Critical Vulns | ✅ No |
AI Analysis
Executive Summary
The "DTK" (Develop Tool Kit) VS Code extension represents a CRITICAL security threat and should be immediately blocked and removed from all environments. The extension exhibits behaviors characteristic of a malicious "dropper" and system compromise tool, including attempts to establish persistence, modify the system registry, and execute arbitrary system commands immediately upon installation. With an unverified publisher and a massive volume of high-severity malware signatures, this extension poses an imminent risk of data exfiltration and total system compromise.
Threat Assessment
The analysis indicates that this extension is likely a vehicle for malware delivery rather than a legitimate development tool. The threat profile is defined by the following behaviors:
- Supply Chain Attack Vector (Post-Install Scripts): The prevalence of
postinstall_signatures suggests the malicious code is designed to execute automatically as soon as the extension or its dependencies are installed. This is a common technique to bypass sandbox restrictions and execute code with the user's privileges before the user even interacts with the extension. - System Persistence & Modification: The presence of
postinstall_persistence_mechanismandpostinstall_registry_modificationis highly alarming. Legitimate VS Code extensions rarely, if ever, need to modify the Windows Registry or establish persistence mechanisms (auto-start entries). This behavior is indicative of malware attempting to survive system reboots. - Dropper Behavior: The combination of
postinstall_file_downloadandpostinstall_network_communicationsuggests the extension acts as a "dropper." It likely connects to a Command & Control (C2) server to download and execute a second-stage payload (e.g., ransomware, cryptominer, or info-stealer). - Massive Code Obfuscation/Bloat: The sheer volume of findings (over 32,000) suggests the extension may contain a massive amount of obfuscated code or is bundling known malicious libraries, triggering thousands of heuristic matches.
Risk Justification
The calculated Risk Score of 100.0/100 is fully justified and accurate.
- Severity of Indicators: The findings are not merely "vulnerabilities" (like XSS or weak encryption); they are malware signatures. The specific combination of Registry Modification + Persistence + File Download is the "unholy trinity" of malware behavior.
- Publisher Trust: The publisher "shanzhenhua" is unverified and the extension has a generic description ("Develop Tool Kit") with low user counts, fitting the profile of a malicious actor testing a payload or targeting specific developers.
- Immediate Execution: The risk is realized immediately upon installation due to the post-install scripts, leaving no window for safe evaluation by the user.
Key Findings
- Persistence Mechanisms (High Severity): Multiple YARA matches for
postinstall_persistence_mechanismindicate code designed to ensure the malicious payload restarts automatically when the computer reboots. - Registry Modification (High Severity): The
postinstall_registry_modificationfinding suggests the extension attempts to alter the operating system's configuration database, potentially to lower security settings or hide its presence. - Unauthorized Network Activity (High Severity):
postinstall_network_communicationandpostinstall_file_downloadindicate the extension attempts to reach external servers to fetch additional files without user consent. - Arbitrary Command Execution (High Severity):
postinstall_system_commandconfirms the extension attempts to run shell commands on the host OS, granting it full control within the user's permission scope.
Recommendations
- Immediate Removal: Uninstall the "DTK" extension from all VS Code instances immediately.
- Blocklist Implementation: Add the Extension UUID (
c18f60e9-6511-5305-907f-6956dc72a726) to the organization's VS Code extension blocklist to prevent future installation. - Incident Response: For any machine where this extension was installed:
- Isolate the machine from the network.
- Scan for persistence mechanisms (e.g., check Startup folders, Run registry keys, Scheduled Tasks).
- Review network logs for connections to unknown IPs/domains initiated around the time of installation.
- Credential Rotation: Assume compromise of any secrets (API keys, SSH keys, environment variables) accessible to the VS Code environment on affected machines. Rotate these credentials immediately.
- Report Abuse: Report the extension to the VS Code Marketplace for takedown.
Mitigation Strategies
There are no viable mitigation strategies for using this extension safely.
Due to the presence of post-install scripts that execute arbitrary system commands and modify the registry, the extension compromises the environment the moment it is installed. It cannot be sandboxed effectively within the standard VS Code environment. Do not use this extension.
Confidence Assessment
Confidence Level: 80% (High)
While I have not manually reverse-engineered the binary code, the automated analysis provides strong, convergent evidence. The specific combination of YARA rules triggering (Registry + Persistence + Download + Post-install) creates a distinct fingerprint of malicious activity that is extremely unlikely to be a false positive for a legitimate "Developer Tool Kit." The unverified publisher status further solidifies this assessment.
Disclaimer
This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace