Is "AVAP API Source Control" on VS Code Marketplace Safe to Install?
VerifiedAVAP API Source Control
Risk Assessment
Analyzed22635 security findings detected across all analyzers
VS Code extension analyzed via package manifest and static code analysis
Severity Breakdown
Finding Categories
YARA Rules Matched
19 rules(1000 hits)About This Extension
Detailed Findings
1000 totalYARA Rule Matches
19 rulesAI Security Report
AI Security Analysis: AVAP API Source Control
Analysis generated: 2025-12-12T00:54:54+13:00
Model: gemini-3-pro-preview
Quick Facts
| Property | Value |
|---|---|
| UUID | e17ea6cb-304a-5ea6-8210-369c78e84a9a |
| Type | vscode |
| Version | 1.30.146 |
| Users | 104 |
| Risk Score | 100.0/100 (CRITICAL) |
| Malware Detected | ⚠️ Yes |
| Secrets Exposed | ✅ No |
| Critical Vulns | ✅ No |
AI Analysis
Executive Summary
The "AVAP API Source Control" VS Code extension represents a CRITICAL security threat and should be blocked or removed immediately. The extension exhibits behaviors highly consistent with malicious software, specifically supply chain attacks that leverage installation scripts to execute arbitrary code. With a risk score of 100/100, an unverified publisher, and over 3,000 high-severity findings related to system manipulation and network activity, this extension poses an immediate danger to developer environments and intellectual property.
Threat Assessment
The security posture of this extension is non-existent. The analysis reveals a pattern of behavior typical of "dropper" malware or compromised dependencies.
- Supply Chain Attack Vector: The prevalence of
postinstallfindings indicates the extension attempts to execute code immediately upon installation, bypassing standard VS Code API restrictions. This is a common tactic to establish persistence or download second-stage payloads. - Arbitrary Code Execution: Findings regarding
system_commandandUsingShellInterpretersuggest the extension is executing shell commands directly on the host OS, rather than operating within the IDE's sandbox. - Credential Theft Risk: Multiple flags for
credential_env_filesindicate the extension actively scans for or attempts to read environment variable files (e.g.,.env), which typically contain API keys and secrets. - Obfuscation: The presence of
postinstall_obfuscationsuggests an intentional effort to hide the logic of the installation scripts, a strong indicator of malicious intent.
Risk Justification
The calculated Risk Score of 100.0/100 is fully justified and accurate.
- Malicious Behavior: The extension triggers thousands of malware signatures specifically targeting the installation phase (
postinstall), which is the most privileged moment in an extension's lifecycle. - Zero Trust: The publisher is unverified, and the user count is negligible (104), meaning there is no community vetting or reputation to rely on.
- Severity of Indicators: The combination of downloading files, executing shell commands, and accessing network resources during installation—while simultaneously obfuscating code—is a definitive profile of malware.
Key Findings
- Aggressive Post-Install Activity (
postinstall_network_communication,postinstall_file_download): The extension attempts to connect to the internet and download files immediately after being installed. This is not standard behavior for a source control extension and suggests it is fetching a malicious payload. - System Command Execution (
postinstall_system_command,UsingShellInterpreterWhenExecutingOSCommands): The code contains instructions to execute operating system commands via the shell. This grants the extension the same privileges as the user running VS Code. - Credential Targeting (
credential_env_files): The analysis detected patterns associated with locating and reading sensitive configuration files, posing a direct risk of secret exfiltration. - Code Obfuscation (
postinstall_obfuscation): The installation scripts are obfuscated, preventing easy static analysis and hiding the true intent of the code. - Weak Cryptography (
NoUseWeakRandom): While less critical than the above, the use of weak random number generators indicates poor coding practices, though in this context, it is likely a secondary issue to the malicious intent.
Recommendations
- IMMEDIATE REMOVAL: Uninstall this extension from all environments immediately.
- BLOCKLIST: Add the extension UUID (
e17ea6cb-304a-5ea6-8210-369c78e84a9a) to the organization's VS Code extension blocklist. - INCIDENT RESPONSE: If this extension was installed on any machine:
- Rotate all credentials (API keys, SSH keys, database passwords) present on that machine, specifically those in
.envfiles. - Review network logs for connections initiated by the VS Code process to unknown IP addresses.
- Scan the machine for persistence mechanisms (cron jobs, startup scripts) created around the time of installation.
- Rotate all credentials (API keys, SSH keys, database passwords) present on that machine, specifically those in
- POLICY ENFORCEMENT: Implement a policy requiring extensions to come from Verified Publishers or be vetted before installation.
Mitigation Strategies
There is no safe way to use this extension in a production or development environment.
If the extension's functionality is absolutely required for research or forensic analysis:
- Strict Isolation: Only install and run this extension inside a disposable, non-networked Virtual Machine (VM) or a sandbox that contains no production credentials.
- Network Air-Gapping: Ensure the environment has no internet access to prevent the
postinstallscripts from downloading payloads or exfiltrating data. - File System Monitoring: Use file system monitoring tools to observe what files the extension attempts to modify upon installation.
Confidence Assessment
Confidence Level: HIGH (80-90%)
While "malware-signature" findings can sometimes be false positives (e.g., a legitimate tool using a network library), the convergence of specific indicators here is damning. The combination of an unverified publisher, low user count, obfuscation, and aggressive post-install system commands creates a threat profile that is almost certainly malicious. The sheer volume of findings (22,000+) further suggests a bloated or compromised codebase.
Disclaimer
This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace
AVAP API Specs
AVAP Framework
AVAP API Release Manager
AVAP Framework
AVAP DEV Extensions for Microsoft Visual Studio
AVAP Framework
AVAP Linter & Completion
AVAP Framework
AVAP Brunix
AVAP Framework
AVAP API Designer
AVAP Framework