Is "AVAP API Source Control" on VS Code Marketplace Safe to Install?

Verified
AVAP Framework · vscode · v1.30.146

AVAP API Source Control

Risk Assessment

Analyzed
100
out of 100
CRITICAL

22635 security findings detected across all analyzers

VS Code extension analyzed via package manifest and static code analysis

Severity Breakdown

0
Critical
3010
High
19615
Medium
10
Low
0
Info

Finding Categories

1000
Malware Signatures

YARA Rules Matched

19 rules(1000 hits)
postinstall file manipulation postinstall obfuscation postinstall crypto operations postinstall network communication postinstall system command postinstall file download credential env files postinstall environment access NoUseWeakRandom postinstall persistence mechanism postinstall registry modification ServerCertificatesNotVerified AlertStatementsShouldNotBeUsed DebuggerStatementsShouldNotBeUsed Surtr SurtrStrings +3 more

About This Extension

AVAP API Source Control

Detailed Findings

1000 total

YARA Rule Matches

19 rules

AI Security Report

AI Security Analysis: AVAP API Source Control

Analysis generated: 2025-12-12T00:54:54+13:00
Model: gemini-3-pro-preview


Quick Facts

Property Value
UUID e17ea6cb-304a-5ea6-8210-369c78e84a9a
Type vscode
Version 1.30.146
Users 104
Risk Score 100.0/100 (CRITICAL)
Malware Detected ⚠️ Yes
Secrets Exposed ✅ No
Critical Vulns ✅ No

AI Analysis

Executive Summary

The "AVAP API Source Control" VS Code extension represents a CRITICAL security threat and should be blocked or removed immediately. The extension exhibits behaviors highly consistent with malicious software, specifically supply chain attacks that leverage installation scripts to execute arbitrary code. With a risk score of 100/100, an unverified publisher, and over 3,000 high-severity findings related to system manipulation and network activity, this extension poses an immediate danger to developer environments and intellectual property.

Threat Assessment

The security posture of this extension is non-existent. The analysis reveals a pattern of behavior typical of "dropper" malware or compromised dependencies.

  • Supply Chain Attack Vector: The prevalence of postinstall findings indicates the extension attempts to execute code immediately upon installation, bypassing standard VS Code API restrictions. This is a common tactic to establish persistence or download second-stage payloads.
  • Arbitrary Code Execution: Findings regarding system_command and UsingShellInterpreter suggest the extension is executing shell commands directly on the host OS, rather than operating within the IDE's sandbox.
  • Credential Theft Risk: Multiple flags for credential_env_files indicate the extension actively scans for or attempts to read environment variable files (e.g., .env), which typically contain API keys and secrets.
  • Obfuscation: The presence of postinstall_obfuscation suggests an intentional effort to hide the logic of the installation scripts, a strong indicator of malicious intent.

Risk Justification

The calculated Risk Score of 100.0/100 is fully justified and accurate.

  1. Malicious Behavior: The extension triggers thousands of malware signatures specifically targeting the installation phase (postinstall), which is the most privileged moment in an extension's lifecycle.
  2. Zero Trust: The publisher is unverified, and the user count is negligible (104), meaning there is no community vetting or reputation to rely on.
  3. Severity of Indicators: The combination of downloading files, executing shell commands, and accessing network resources during installation—while simultaneously obfuscating code—is a definitive profile of malware.

Key Findings

  • Aggressive Post-Install Activity (postinstall_network_communication, postinstall_file_download): The extension attempts to connect to the internet and download files immediately after being installed. This is not standard behavior for a source control extension and suggests it is fetching a malicious payload.
  • System Command Execution (postinstall_system_command, UsingShellInterpreterWhenExecutingOSCommands): The code contains instructions to execute operating system commands via the shell. This grants the extension the same privileges as the user running VS Code.
  • Credential Targeting (credential_env_files): The analysis detected patterns associated with locating and reading sensitive configuration files, posing a direct risk of secret exfiltration.
  • Code Obfuscation (postinstall_obfuscation): The installation scripts are obfuscated, preventing easy static analysis and hiding the true intent of the code.
  • Weak Cryptography (NoUseWeakRandom): While less critical than the above, the use of weak random number generators indicates poor coding practices, though in this context, it is likely a secondary issue to the malicious intent.

Recommendations

  1. IMMEDIATE REMOVAL: Uninstall this extension from all environments immediately.
  2. BLOCKLIST: Add the extension UUID (e17ea6cb-304a-5ea6-8210-369c78e84a9a) to the organization's VS Code extension blocklist.
  3. INCIDENT RESPONSE: If this extension was installed on any machine:
    • Rotate all credentials (API keys, SSH keys, database passwords) present on that machine, specifically those in .env files.
    • Review network logs for connections initiated by the VS Code process to unknown IP addresses.
    • Scan the machine for persistence mechanisms (cron jobs, startup scripts) created around the time of installation.
  4. POLICY ENFORCEMENT: Implement a policy requiring extensions to come from Verified Publishers or be vetted before installation.

Mitigation Strategies

There is no safe way to use this extension in a production or development environment.

If the extension's functionality is absolutely required for research or forensic analysis:

  1. Strict Isolation: Only install and run this extension inside a disposable, non-networked Virtual Machine (VM) or a sandbox that contains no production credentials.
  2. Network Air-Gapping: Ensure the environment has no internet access to prevent the postinstall scripts from downloading payloads or exfiltrating data.
  3. File System Monitoring: Use file system monitoring tools to observe what files the extension attempts to modify upon installation.

Confidence Assessment

Confidence Level: HIGH (80-90%)

While "malware-signature" findings can sometimes be false positives (e.g., a legitimate tool using a network library), the convergence of specific indicators here is damning. The combination of an unverified publisher, low user count, obfuscation, and aggressive post-install system commands creates a threat profile that is almost certainly malicious. The sheer volume of findings (22,000+) further suggests a bloated or compromised codebase.


Disclaimer

This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.

Frequently Asked Questions