Is "Aspire" on JetBrains Marketplace Safe to Install?

Verified
JetBrains s.r.o. · jetbrains · v2.5.1

The plugin provides support for Aspire projects in JetBrains Rider. Features: Support for running and debugging of Aspire projectsResource dashboardManifest...

Risk Assessment

Analyzed
100
out of 100
CRITICAL

346 security findings detected across all analyzers

JetBrains plugin analyzed via plugin.xml configuration and static code analysis

Severity Breakdown

30
Critical
45
High
222
Medium
0
Low
0
Info

Finding Categories

45
Malware Signatures
30
Obfuscation
209
IoC Indicators

YARA Rules Matched

12 rules(45 hits)
postinstall file download postinstall crypto operations postinstall system command postinstall file manipulation postinstall network communication PM Zip with js postinstall registry modification postinstall obfuscation credential env files postinstall persistence mechanism JavaDropper DebuggerStatementsShouldNotBeUsed

About This Extension

The plugin provides support for Aspire projects in JetBrains Rider. Features: Support for running and debugging of Aspire projectsResource dashboardManifest...

Detailed Findings

124 total

YARA Rule Matches

12 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
37
IP Addresses
27
Domains
114
Strings
209

All Indicators · 209

Domain
detected Domain: v.cw

XIOC detected Domain: v.cw

extracted_from_files

Domain
detected Domain: introduceoptionalparameters.global

XIOC detected Domain: introduceoptionalparameters.global

extracted_from_files

URL
detected URL: http://www.microsoft.com/pkiops/crl/Microsoft%20Public%20RSA%20Timestamping%20CA%202020.crl0y

XIOC detected URL: http://www.microsoft.com/pkiops/crl/Microsoft%20Public%20RSA%20Timestamping%20CA%202020.crl0y

extracted_from_files

URL
detected URL: http://www.microsoft.com/pkiops/Docs/Repository.htm0

XIOC detected URL: http://www.microsoft.com/pkiops/Docs/Repository.htm0

extracted_from_files

Domain
detected Domain: unusedmember.global

XIOC detected Domain: unusedmember.global

extracted_from_files

Domain
detected Domain: unusedtype.global

XIOC detected Domain: unusedtype.global

extracted_from_files

Domain
detected Domain: www.jetbrains.com

XIOC detected Domain: www.jetbrains.com

extracted_from_files

IP
detected IP: 2.76.0.0

XIOC detected IP: 2.76.0.0

extracted_from_files

Domain
detected Domain: d.je

XIOC detected Domain: d.je

extracted_from_files

IP
detected IP: 2.0.0.0

XIOC detected IP: 2.0.0.0

extracted_from_files

IP
detected IP: 3.31.1.0

XIOC detected IP: 3.31.1.0

extracted_from_files

Domain
detected Domain: d.sk

XIOC detected Domain: d.sk

extracted_from_files

IP
detected IP: ::a

XIOC detected IP: ::a

extracted_from_files

IP
detected IP: 5.0.0.0

XIOC detected IP: 5.0.0.0

extracted_from_files

IP
detected IP: b::

XIOC detected IP: b::

extracted_from_files

IP
detected IP: ::e

XIOC detected IP: ::e

extracted_from_files

Hash
detected SHA1 Hash: b3cb1f042f5636161b831fa8816d70d865a5eec4

XIOC detected SHA1 Hash: b3cb1f042f5636161b831fa8816d70d865a5eec4

extracted_from_files

Hash
detected SHA1 Hash: ee5eca4093be269bf3c1b609e6c2088d79a1b132

XIOC detected SHA1 Hash: ee5eca4093be269bf3c1b609e6c2088d79a1b132

extracted_from_files

Hash
detected SHA1 Hash: 23c732a8658a0df2a5434fe69b0011800b14f0da

XIOC detected SHA1 Hash: 23c732a8658a0df2a5434fe69b0011800b14f0da

extracted_from_files

Hash
detected SHA1 Hash: 726e29c5b172aa8813285be1ad8cc728fd531eab

XIOC detected SHA1 Hash: 726e29c5b172aa8813285be1ad8cc728fd531eab

extracted_from_files

Hash
detected SHA1 Hash: 077cf388fc5a85a7f6cd0fdcb2b68d17a898019e

XIOC detected SHA1 Hash: 077cf388fc5a85a7f6cd0fdcb2b68d17a898019e

extracted_from_files

Hash
detected SHA1 Hash: 0ddce6f80a805da7a982a912f5dde9998644f103

XIOC detected SHA1 Hash: 0ddce6f80a805da7a982a912f5dde9998644f103

extracted_from_files

Hash
detected SHA1 Hash: 8d44e12b795b5f52231349340ad0d86d5a25a379

XIOC detected SHA1 Hash: 8d44e12b795b5f52231349340ad0d86d5a25a379

extracted_from_files

Hash
detected SHA1 Hash: 538cf2fd64baf760950e202a00dd426c6b76e18c

XIOC detected SHA1 Hash: 538cf2fd64baf760950e202a00dd426c6b76e18c

extracted_from_files

Hash
detected SHA1 Hash: 8472ad8ccb97432ca7efbe78d8bc0eaf61db5356

XIOC detected SHA1 Hash: 8472ad8ccb97432ca7efbe78d8bc0eaf61db5356

extracted_from_files

Hash
detected SHA1 Hash: 1c40c46d1a3a988fcce0a595959e31b4fcb1dda0

XIOC detected SHA1 Hash: 1c40c46d1a3a988fcce0a595959e31b4fcb1dda0

extracted_from_files

Hash
detected SHA1 Hash: 5c6e5df7dffe5535978475c9ce8c5c6fb1cc9dca

XIOC detected SHA1 Hash: 5c6e5df7dffe5535978475c9ce8c5c6fb1cc9dca

extracted_from_files

Hash
detected SHA1 Hash: 40cd698e5cfb2d90f436889726ee01f48d99f3ab

XIOC detected SHA1 Hash: 40cd698e5cfb2d90f436889726ee01f48d99f3ab

extracted_from_files

Hash
detected SHA1 Hash: 74211c0dfc2777318ab53c2cd2c317a2ef9012de

XIOC detected SHA1 Hash: 74211c0dfc2777318ab53c2cd2c317a2ef9012de

extracted_from_files

Hash
detected SHA1 Hash: c52862d2be28c252a20786e08b82c48edcbf7325

XIOC detected SHA1 Hash: c52862d2be28c252a20786e08b82c48edcbf7325

extracted_from_files

Hash
detected SHA1 Hash: 332ebae986c8887bdbcd5525bdadbf962b1b56a3

XIOC detected SHA1 Hash: 332ebae986c8887bdbcd5525bdadbf962b1b56a3

extracted_from_files

Hash
detected SHA1 Hash: cbb2583b19d5b3984210451295ebc7e99be6bb2f

XIOC detected SHA1 Hash: cbb2583b19d5b3984210451295ebc7e99be6bb2f

extracted_from_files

Hash
detected SHA1 Hash: 0ae4c336dd9f1b59b1e25bcf341da7315d657557

XIOC detected SHA1 Hash: 0ae4c336dd9f1b59b1e25bcf341da7315d657557

extracted_from_files

Hash
detected SHA1 Hash: b0f34d51fccc69fd334253924abd8d6853fad7aa

XIOC detected SHA1 Hash: b0f34d51fccc69fd334253924abd8d6853fad7aa

extracted_from_files

Hash
detected SHA256 Hash: F1945CD6C19E56B3C1C78943EF5EC18116907A4CA1EFC40A57D48AB1DB7ADFC5

XIOC detected SHA256 Hash: F1945CD6C19E56B3C1C78943EF5EC18116907A4CA1EFC40A57D48AB1DB7ADFC5

extracted_from_files

Hash
detected MD5 Hash: 19ff3e9c3602ae8e841925bb461a0adb

XIOC detected MD5 Hash: 19ff3e9c3602ae8e841925bb461a0adb

extracted_from_files

Hash
detected MD5 Hash: 064a1f1903667a5e0d87e8f608f425ac

XIOC detected MD5 Hash: 064a1f1903667a5e0d87e8f608f425ac

extracted_from_files

Hash
detected MD5 Hash: c3ab8ff13720e8ad9047dd39466b3c89

XIOC detected MD5 Hash: c3ab8ff13720e8ad9047dd39466b3c89

extracted_from_files

Hash
detected MD5 Hash: 74e592c2fa383d4a3960714caef0c4f2

XIOC detected MD5 Hash: 74e592c2fa383d4a3960714caef0c4f2

extracted_from_files

Hash
detected SHA1 Hash: 80d3e14f5e08b4888f464e3cd0d0b2445b63ec46

XIOC detected SHA1 Hash: 80d3e14f5e08b4888f464e3cd0d0b2445b63ec46

extracted_from_files

Hash
detected SHA1 Hash: 35b28f50155961e4df56046536b40bc9df8889af

XIOC detected SHA1 Hash: 35b28f50155961e4df56046536b40bc9df8889af

extracted_from_files

URL
detected URL: https://raw.githubusercontent.com/JetBrains/aspire-plugin/35b28f50155961e4df56046536b40bc9df8889af/*

XIOC detected URL: https://raw.githubusercontent.com/JetBrains/aspire-plugin/35b28f50155961e4df56046536b40bc9df8889af/*

extracted_from_files

Hash
detected SHA256 Hash: 19ff3e9c3602ae8e841925bb461a0adb064a1f1903667a5e0d87e8f608f425ac

XIOC detected SHA256 Hash: 19ff3e9c3602ae8e841925bb461a0adb064a1f1903667a5e0d87e8f608f425ac

extracted_from_files

Hash
detected SHA256 Hash: 1EFF1891409D680B30DE202BD7A16F945ED09F02601C0E7B90FD917BE1162300

XIOC detected SHA256 Hash: 1EFF1891409D680B30DE202BD7A16F945ED09F02601C0E7B90FD917BE1162300

extracted_from_files

Hash
detected SHA256 Hash: 2EF83B43314F8CD03190EEE30ECCF048DA37791237F27C62A579F23EACE9FD70

XIOC detected SHA256 Hash: 2EF83B43314F8CD03190EEE30ECCF048DA37791237F27C62A579F23EACE9FD70

extracted_from_files

Hash
detected SHA256 Hash: C6489BEB86EF546FA96567338ADEFEA0F31D1E3CB88C8D2DF7D8780DA162E5C1

XIOC detected SHA256 Hash: C6489BEB86EF546FA96567338ADEFEA0F31D1E3CB88C8D2DF7D8780DA162E5C1

extracted_from_files

Hash
detected SHA256 Hash: 92B5A7B5803A052FE67B4B5794C7915611AACF7ADBD19DBA7E1312EC43AFD1AB

XIOC detected SHA256 Hash: 92B5A7B5803A052FE67B4B5794C7915611AACF7ADBD19DBA7E1312EC43AFD1AB

extracted_from_files

Hash
detected SHA256 Hash: BE19405501B615FD6FAA7CE54C8048F76B4B9FDDB37825F99924F02A47F6DA38

XIOC detected SHA256 Hash: BE19405501B615FD6FAA7CE54C8048F76B4B9FDDB37825F99924F02A47F6DA38

extracted_from_files

URL
detected URL: https://github.com/serilog/serilog-formatting-compact

XIOC detected URL: https://github.com/serilog/serilog-formatting-compact

extracted_from_files

URL
detected URL: https://github.com/serilog/serilog-settings-configuration

XIOC detected URL: https://github.com/serilog/serilog-settings-configuration

extracted_from_files

URL
detected URL: https://github.com/serilog/serilog-sinks-async

XIOC detected URL: https://github.com/serilog/serilog-sinks-async

extracted_from_files

URL
detected URL: https://github.com/serilog/serilog-sinks-console

XIOC detected URL: https://github.com/serilog/serilog-sinks-console

extracted_from_files

URL
detected URL: https://github.com/serilog/serilog-sinks-debug.git

XIOC detected URL: https://github.com/serilog/serilog-sinks-debug.git

extracted_from_files

URL
detected URL: https://github.com/serilog/serilog-sinks-file

XIOC detected URL: https://github.com/serilog/serilog-sinks-file

extracted_from_files

URL
detected URL: https://github.com/serilog/serilog

XIOC detected URL: https://github.com/serilog/serilog

extracted_from_files

URL
detected URL: https://github.com/App-vNext/Polly0

XIOC detected URL: https://github.com/App-vNext/Polly0

extracted_from_files

IP
detected IP: 8::

XIOC detected IP: 8::

extracted_from_files

URL
detected URL: https://github.com/serilog/serilog-extensions-logging

XIOC detected URL: https://github.com/serilog/serilog-extensions-logging

extracted_from_files

URL
detected URL: https://github.com/dotnet/extensions

XIOC detected URL: https://github.com/dotnet/extensions

extracted_from_files

URL
detected URL: https://github.com/serilog/serilog-aspnetcore

XIOC detected URL: https://github.com/serilog/serilog-aspnetcore

extracted_from_files

IP
detected IP: c::

XIOC detected IP: c::

extracted_from_files

IP
detected IP: 1.0.0.0

XIOC detected IP: 1.0.0.0

extracted_from_files

IP
detected IP: 7.0.0.0

XIOC detected IP: 7.0.0.0

extracted_from_files

URL
detected URL: https://aka.ms/dotnet-extensions-warnings/

XIOC detected URL: https://aka.ms/dotnet-extensions-warnings/

extracted_from_files

URL
detected URL: https://github.com/App-vNext/Polly

XIOC detected URL: https://github.com/App-vNext/Polly

extracted_from_files

URL
detected URL: http://crl3.digicert.com/NETFoundationProjectsCodeSigningCA2.crl0F

XIOC detected URL: http://crl3.digicert.com/NETFoundationProjectsCodeSigningCA2.crl0F

extracted_from_files

URL
detected URL: http://www.digicert.com/CPS0

XIOC detected URL: http://www.digicert.com/CPS0

extracted_from_files

URL
detected URL: http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl0a

XIOC detected URL: http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl0a

extracted_from_files

URL
detected URL: http://www.microsoft.com/pkiops/docs/primarycps.htm0@

XIOC detected URL: http://www.microsoft.com/pkiops/docs/primarycps.htm0@

extracted_from_files

URL
detected URL: http://www.microsoft.com0

XIOC detected URL: http://www.microsoft.com0

extracted_from_files

URL
detected URL: http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl0l

XIOC detected URL: http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl0l

extracted_from_files

URL
detected URL: https://github.com/dotnet/dotnet

XIOC detected URL: https://github.com/dotnet/dotnet

extracted_from_files

URL
detected URL: https://github.com/JetBrains/JetBrains.Annotations/

XIOC detected URL: https://github.com/JetBrains/JetBrains.Annotations/

extracted_from_files

URL
detected URL: http://www.jetbrains.com

XIOC detected URL: http://www.jetbrains.com

extracted_from_files

URL
detected URL: https://www.jetbrains.com/help/resharper/Navigation_and_Search__Structural_Search_and_Replace.html

XIOC detected URL: https://www.jetbrains.com/help/resharper/Navigation_and_Search__Structural_Search_and_Replace.html

extracted_from_files

URL
detected URL: https://www.jetbrains.com/help/resharper/Code_Analysis__Find_and_Update_Obsolete_APIs.html

XIOC detected URL: https://www.jetbrains.com/help/resharper/Code_Analysis__Find_and_Update_Obsolete_APIs.html

extracted_from_files

URL
detected URL: https://github.com/JetBrains/rd

XIOC detected URL: https://github.com/JetBrains/rd

extracted_from_files

URL
detected URL: https://github.com/grpc/grpc-dotnet.git

XIOC detected URL: https://github.com/grpc/grpc-dotnet.git

extracted_from_files

URL
detected URL: https://aka.ms/aspnet/grpc/subdir

XIOC detected URL: https://aka.ms/aspnet/grpc/subdir

extracted_from_files

URL
detected URL: https://aka.ms/dotnet/app-launch-failed

XIOC detected URL: https://aka.ms/dotnet/app-launch-failed

extracted_from_files

URL
detected URL: https://aka.ms/dotnet-core-applaunch?

XIOC detected URL: https://aka.ms/dotnet-core-applaunch?

extracted_from_files

URL
detected URL: https://github.com/protocolbuffers/protobuf.git

XIOC detected URL: https://github.com/protocolbuffers/protobuf.git

extracted_from_files

URL
detected URL: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0

XIOC detected URL: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0

extracted_from_files

URL
detected URL: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S

XIOC detected URL: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S

extracted_from_files

Domain
detected Domain: pq.ci

XIOC detected Domain: pq.ci

extracted_from_files

Domain
detected Domain: g.vn

XIOC detected Domain: g.vn

extracted_from_files

Domain
detected Domain: tz.tr

XIOC detected Domain: tz.tr

extracted_from_files

Domain
detected Domain: 4.id

XIOC detected Domain: 4.id

extracted_from_files

Domain
detected Domain: ř.ae

XIOC detected Domain: ř.ae

extracted_from_files

Domain
detected Domain: on.hk

XIOC detected Domain: on.hk

extracted_from_files

Domain
detected Domain: aspireriderbundle.properties

XIOC detected Domain: aspireriderbundle.properties

extracted_from_files

Domain
detected Domain: aspirecorebundle.properties

XIOC detected Domain: aspirecorebundle.properties

extracted_from_files

Domain
detected Domain: aspiredatabasebundle.properties

XIOC detected Domain: aspiredatabasebundle.properties

extracted_from_files

Domain
detected Domain: t.gy

XIOC detected Domain: t.gy

extracted_from_files

Domain
detected Domain: 1.ec

XIOC detected Domain: 1.ec

extracted_from_files

Domain
detected Domain: uvﳶ.co

XIOC detected Domain: uvﳶ.co

extracted_from_files

Domain
detected Domain: ţaa.bi

XIOC detected Domain: ţaa.bi

extracted_from_files

IP
detected IP: 4.3.0.0

XIOC detected IP: 4.3.0.0

extracted_from_files

URL
detected URL: http://www.microsoft.com/pkiops/crl/Microsoft%20Identity%20Verification%20Root%20Certificate%20Authority%202020.crl0

XIOC detected URL: http://www.microsoft.com/pkiops/crl/Microsoft%20Identity%20Verification%20Root%20Certificate%20Authority%202020.crl0

extracted_from_files

IP
detected IP: 8.0.0.0

XIOC detected IP: 8.0.0.0

extracted_from_files

Domain
detected Domain: 8.ms

XIOC detected Domain: 8.ms

extracted_from_files

Domain
detected Domain: g.qa

XIOC detected Domain: g.qa

extracted_from_files

Domain
detected Domain: o.cu

XIOC detected Domain: o.cu

extracted_from_files

Domain
detected Domain: ͅ.lv

XIOC detected Domain: ͅ.lv

extracted_from_files

Domain
detected Domain: ɂyp.gg

XIOC detected Domain: ɂyp.gg

extracted_from_files

Domain
detected Domain: kotlinx-serialization-common.pro

XIOC detected Domain: kotlinx-serialization-common.pro

extracted_from_files

URL
detected URL: https://github.com/serilog/serilog-extensions-hosting

XIOC detected URL: https://github.com/serilog/serilog-extensions-hosting

extracted_from_files

Domain
detected Domain: kotlinx-serialization-r8.pro

XIOC detected Domain: kotlinx-serialization-r8.pro

extracted_from_files

Domain
detected Domain: apkc.gu

XIOC detected Domain: apkc.gu

extracted_from_files

Domain
detected Domain: h.cc

XIOC detected Domain: h.cc

extracted_from_files

Domain
detected Domain: t.uz

XIOC detected Domain: t.uz

extracted_from_files

Domain
detected Domain: b.ge

XIOC detected Domain: b.ge

extracted_from_files

Domain
detected Domain: w.no

XIOC detected Domain: w.no

extracted_from_files

Domain
detected Domain: bg.ec

XIOC detected Domain: bg.ec

extracted_from_files

Domain
detected Domain: 4.gg

XIOC detected Domain: 4.gg

extracted_from_files

Domain
detected Domain: 8bqtƒ.au

XIOC detected Domain: 8bqtƒ.au

extracted_from_files

Domain
detected Domain: k.ir

XIOC detected Domain: k.ir

extracted_from_files

Domain
detected Domain: w.np

XIOC detected Domain: w.np

extracted_from_files

Domain
detected Domain: ӆc.in

XIOC detected Domain: ӆc.in

extracted_from_files

Domain
detected Domain: y.vn

XIOC detected Domain: y.vn

extracted_from_files

Domain
detected Domain: 0.mo

XIOC detected Domain: 0.mo

extracted_from_files

Domain
detected Domain: r.mn

XIOC detected Domain: r.mn

extracted_from_files

Domain
detected Domain: y.aw

XIOC detected Domain: y.aw

extracted_from_files

Domain
detected Domain: g.eu

XIOC detected Domain: g.eu

extracted_from_files

Domain
detected Domain: v.me

XIOC detected Domain: v.me

extracted_from_files

Domain
detected Domain: t.st

XIOC detected Domain: t.st

extracted_from_files

Domain
detected Domain: f.ml

XIOC detected Domain: f.ml

extracted_from_files

Domain
detected Domain: pk.td

XIOC detected Domain: pk.td

extracted_from_files

Domain
detected Domain: 7.is

XIOC detected Domain: 7.is

extracted_from_files

Domain
detected Domain: e.dz

XIOC detected Domain: e.dz

extracted_from_files

Domain
detected Domain: ق.tv

XIOC detected Domain: ق.tv

extracted_from_files

Domain
detected Domain: d-.cf

XIOC detected Domain: d-.cf

extracted_from_files

Domain
detected Domain: j.hn

XIOC detected Domain: j.hn

extracted_from_files

Domain
detected Domain: jetbrains.resharper.unittestframework.execution.hosting

XIOC detected Domain: jetbrains.resharper.unittestframework.execution.hosting

extracted_from_files

Domain
detected Domain: jetbrains.platform.shell

XIOC detected Domain: jetbrains.platform.shell

extracted_from_files

Domain
detected Domain: jetbrains.resharper.feature.services

XIOC detected Domain: jetbrains.resharper.feature.services

extracted_from_files

Domain
detected Domain: jetbrains.projectmodel.properties

XIOC detected Domain: jetbrains.projectmodel.properties

extracted_from_files

Domain
detected Domain: jetbrains.application.parts

XIOC detected Domain: jetbrains.application.parts

extracted_from_files

Domain
detected Domain: jetbrains.platform.projectmodel.host

XIOC detected Domain: jetbrains.platform.projectmodel.host

extracted_from_files

Domain
detected Domain: pom.properties

XIOC detected Domain: pom.properties

extracted_from_files

Domain
detected Domain: 6jetbrains.threading.actor

XIOC detected Domain: 6jetbrains.threading.actor

extracted_from_files

Domain
detected Domain: z.si

XIOC detected Domain: z.si

extracted_from_files

Domain
detected Domain: www.microsoft.com

XIOC detected Domain: www.microsoft.com

extracted_from_files

Domain
detected Domain: crl.microsoft.com

XIOC detected Domain: crl.microsoft.com

extracted_from_files

Domain
detected Domain: system.sr

XIOC detected Domain: system.sr

extracted_from_files

Domain
detected Domain: polly.circuitbreaker.health

XIOC detected Domain: polly.circuitbreaker.health

extracted_from_files

Domain
detected Domain: serilog.data

XIOC detected Domain: serilog.data

extracted_from_files

Domain
detected Domain: enumerable.select

XIOC detected Domain: enumerable.select

extracted_from_files

Domain
detected Domain: command.id

XIOC detected Domain: command.id

extracted_from_files

Domain
detected Domain: command.name

XIOC detected Domain: command.name

extracted_from_files

Domain
detected Domain: crl.digicert.eu

XIOC detected Domain: crl.digicert.eu

extracted_from_files

Domain
detected Domain: ocsp.digicert.eu

XIOC detected Domain: ocsp.digicert.eu

extracted_from_files

IP
detected IP: 1::

XIOC detected IP: 1::

extracted_from_files

IP
detected IP: 5::

XIOC detected IP: 5::

extracted_from_files

Domain
detected Domain: com.android.tools

XIOC detected Domain: com.android.tools

extracted_from_files

Domain
detected Domain: membercanbeprotected.global

XIOC detected Domain: membercanbeprotected.global

extracted_from_files

Domain
detected Domain: attributetargets.property

XIOC detected Domain: attributetargets.property

extracted_from_files

Domain
detected Domain: x.property

XIOC detected Domain: x.property

extracted_from_files

Domain
detected Domain: sourcetemplateattribute.target

XIOC detected Domain: sourcetemplateattribute.target

extracted_from_files

Domain
detected Domain: macroattribute.target

XIOC detected Domain: macroattribute.target

extracted_from_files

Domain
detected Domain: collectionaccesstype.read

XIOC detected Domain: collectionaccesstype.read

extracted_from_files

Domain
detected Domain: system.net

XIOC detected Domain: system.net

extracted_from_files

Domain
detected Domain: subchannel.id

XIOC detected Domain: subchannel.id

extracted_from_files

IP
detected IP: 6.1.1.0

XIOC detected IP: 6.1.1.0

extracted_from_files

IP
detected IP: 2.1.0.0

XIOC detected IP: 2.1.0.0

extracted_from_files

IP
detected IP: f::bd

XIOC detected IP: f::bd

extracted_from_files

Domain
detected Domain: membercanbeprivate.global

XIOC detected Domain: membercanbeprivate.global

extracted_from_files

Domain
detected Domain: unusedautopropertyaccessor.global

XIOC detected Domain: unusedautopropertyaccessor.global

extracted_from_files

Domain
detected Domain: www.digicert.com

XIOC detected Domain: www.digicert.com

extracted_from_files

Domain
detected Domain: ocsp.digicert.com

XIOC detected Domain: ocsp.digicert.com

extracted_from_files

Domain
detected Domain: cacerts.digicert.com

XIOC detected Domain: cacerts.digicert.com

extracted_from_files

Domain
detected Domain: crl3.digicert.com

XIOC detected Domain: crl3.digicert.com

extracted_from_files

Domain
detected Domain: crl4.digicert.com

XIOC detected Domain: crl4.digicert.com

extracted_from_files

Domain
detected Domain: asp.net

XIOC detected Domain: asp.net

extracted_from_files

Domain
detected Domain: s.ir

XIOC detected Domain: s.ir

extracted_from_files

Domain
detected Domain: yڗbt.af

XIOC detected Domain: yڗbt.af

extracted_from_files

Domain
detected Domain: microsoft.aspnetcore.hosting

XIOC detected Domain: microsoft.aspnetcore.hosting

extracted_from_files

Domain
detected Domain: system.io

XIOC detected Domain: system.io

extracted_from_files

Domain
detected Domain: microsoft.netcore.app

XIOC detected Domain: microsoft.netcore.app

extracted_from_files

Domain
detected Domain: microsoft.aspnetcore.app

XIOC detected Domain: microsoft.aspnetcore.app

extracted_from_files

Domain
detected Domain: system.security

XIOC detected Domain: system.security

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

Domain
detected Domain: data.rel.ro

XIOC detected Domain: data.rel.ro

extracted_from_files

Domain
detected Domain: note.gnu.build

XIOC detected Domain: note.gnu.build

extracted_from_files

Domain
detected Domain: serilog.extensions.hosting

XIOC detected Domain: serilog.extensions.hosting

extracted_from_files

Domain
detected Domain: microsoft.extensions.hosting

XIOC detected Domain: microsoft.extensions.hosting

extracted_from_files

Domain
detected Domain: system.security.claims

XIOC detected Domain: system.security.claims

extracted_from_files

Domain
detected Domain: serilog.events

XIOC detected Domain: serilog.events

extracted_from_files

Domain
detected Domain: myapplication.app

XIOC detected Domain: myapplication.app

extracted_from_files

Domain
detected Domain: libdl.so

XIOC detected Domain: libdl.so

extracted_from_files

Domain
detected Domain: libpthread.so

XIOC detected Domain: libpthread.so

extracted_from_files

Domain
detected Domain: s.so

XIOC detected Domain: s.so

extracted_from_files

Domain
detected Domain: libc.so

XIOC detected Domain: libc.so

extracted_from_files

Domain
detected Domain: libm.so

XIOC detected Domain: libm.so

extracted_from_files

Domain
detected Domain: libcoreclr.so

XIOC detected Domain: libcoreclr.so

extracted_from_files

Domain
detected Domain: libhostfxr.so

XIOC detected Domain: libhostfxr.so

extracted_from_files

IP
detected IP: a::

XIOC detected IP: a::

extracted_from_files

IP
detected IP: 6::

XIOC detected IP: 6::

extracted_from_files

IP
detected IP: ::72

XIOC detected IP: ::72

extracted_from_files

IP
detected IP: 2::

XIOC detected IP: 2::

extracted_from_files

IP
detected IP: ::43

XIOC detected IP: ::43

extracted_from_files

Domain
detected Domain: aka.ms

XIOC detected Domain: aka.ms

extracted_from_files

Domain
detected Domain: ld-linux-x86-64.so

XIOC detected Domain: ld-linux-x86-64.so

extracted_from_files

IP
detected IP: 4.0.0.0

XIOC detected IP: 4.0.0.0

extracted_from_files

IP
detected IP: ::05

XIOC detected IP: ::05

extracted_from_files

IP
detected IP: ::6

XIOC detected IP: ::6

extracted_from_files

Domain
detected Domain: cacerts.digicert.eu

XIOC detected Domain: cacerts.digicert.eu

extracted_from_files

Domain
detected Domain: jetbrains.threading.actor

XIOC detected Domain: jetbrains.threading.actor

extracted_from_files

IP
detected IP: 3.0.0.0

XIOC detected IP: 3.0.0.0

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Aspire is a jetbrains extension published by JetBrains s.r.o.. Version 2.5.1 has been analyzed by the Risky Plugins security platform, receiving a risk score of 100/100 (CRITICAL risk) based on 346 security findings.

Risk Assessment

This extension presents critical security risk. Severe issues were detected, potentially including malware indicators, exposed secrets, or dangerous behaviors. Installation is strongly discouraged until these issues are addressed.

Findings Breakdown

  • Critical: 30 finding(s)
  • High: 45 finding(s)
  • Medium: 222 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Aspire is published by JetBrains s.r.o. on the jetbrains marketplace. The extension has approximately 1.7M users.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions