Is "Markdown42 — Live Markdown Editor" on VS Code Marketplace Safe to Install?

Shaf · vscode · v0.1.1

Typora-style live markdown editor. Click any block to edit inline — no split panes. GitHub-accurate rendering, smart outline, copy button on code blocks, and instant preview/source toggle.

Risk Assessment

Analyzed
64.93
out of 100
MEDIUM

181 security findings detected across all analyzers

VS Code extension analyzed via package manifest and static code analysis

Severity Breakdown

0
Critical
2
High
149
Medium
30
Low
0
Info

Finding Categories

2
Obfuscation
148
IoC Indicators

YARA Rules Matched

11 rules(27 hits)
postinstall network communication postinstall system command credential env files postinstall persistence mechanism NoUseWeakRandom postinstall crypto operations postinstall obfuscation NoDisableSanitizeHtml postinstall file manipulation OriginsNotVerified postinstall file download

About This Extension

Typora-style live markdown editor. Click any block to edit inline — no split panes. GitHub-accurate rendering, smart outline, copy button on code blocks, and instant preview/source toggle.

Detailed Findings

32 total

YARA Rule Matches

11 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
22
IP Addresses
15
Domains
116
Strings
148

All Indicators · 148

Domain
detected Domain: r.us

XIOC detected Domain: r.us

extracted_from_files

Domain
detected Domain: i.map

XIOC detected Domain: i.map

extracted_from_files

Domain
detected Domain: ij1.la

XIOC detected Domain: ij1.la

extracted_from_files

Domain
detected Domain: tl.tc

XIOC detected Domain: tl.tc

extracted_from_files

IP
detected IP: ::bef

XIOC detected IP: ::bef

extracted_from_files

URL
detected URL: https://github.com/markdown42/markdown42-vscode#readme

XIOC detected URL: https://github.com/markdown42/markdown42-vscode#readme

extracted_from_files

URL
detected URL: https://img.shields.io/visual-studio-marketplace/r/markdown42.markdown42?color=0D1117&label=Rating&style=flat-square

XIOC detected URL: https://img.shields.io/visual-studio-marketplace/r/markdown42.markdown42?color=0D1117&label=Rating&style=flat-square

extracted_from_files

URL
detected URL: https://img.shields.io/badge/license-MIT-blue?style=flat-square&color=0D1117

XIOC detected URL: https://img.shields.io/badge/license-MIT-blue?style=flat-square&color=0D1117

extracted_from_files

URL
detected URL: https://github.com/Development-Banner/markdown-42/raw/main/media/markdown42-preview.gif

XIOC detected URL: https://github.com/Development-Banner/markdown-42/raw/main/media/markdown42-preview.gif

extracted_from_files

URL
detected URL: https://github.com/markdown42/markdown42-vscode/blob/HEAD/LICENSE)

XIOC detected URL: https://github.com/markdown42/markdown42-vscode/blob/HEAD/LICENSE)

extracted_from_files

URL
detected URL: http://schemas.microsoft.com/developer/vsx-schema/2011

XIOC detected URL: http://schemas.microsoft.com/developer/vsx-schema/2011

extracted_from_files

URL
detected URL: http://schemas.microsoft.com/developer/vsx-schema-design/2011

XIOC detected URL: http://schemas.microsoft.com/developer/vsx-schema-design/2011

extracted_from_files

URL
detected URL: https://github.com/markdown42/markdown42-vscode.git

XIOC detected URL: https://github.com/markdown42/markdown42-vscode.git

extracted_from_files

URL
detected URL: https://github.com/markdown42/markdown42-vscode

XIOC detected URL: https://github.com/markdown42/markdown42-vscode

extracted_from_files

URL
detected URL: https://github.com/markdown42/markdown42-vscode/issues

XIOC detected URL: https://github.com/markdown42/markdown42-vscode/issues

extracted_from_files

URL
detected URL: https://github.com/markdown42/markdown42-vscode/raw/HEAD/media/icon.png

XIOC detected URL: https://github.com/markdown42/markdown42-vscode/raw/HEAD/media/icon.png

extracted_from_files

URL
detected URL: https://marketplace.visualstudio.com/items?itemName=markdown42.markdown42

XIOC detected URL: https://marketplace.visualstudio.com/items?itemName=markdown42.markdown42

extracted_from_files

URL
detected URL: https://img.shields.io/visual-studio-marketplace/v/markdown42.markdown42?color=0D1117&label=Marketplace&logo=visual-studio-code&logoColor=white&style=flat-square

XIOC detected URL: https://img.shields.io/visual-studio-marketplace/v/markdown42.markdown42?color=0D1117&label=Marketplace&logo=visual-studio-code&logoColor=white&style=flat-square

extracted_from_files

URL
detected URL: https://img.shields.io/visual-studio-marketplace/i/markdown42.markdown42?color=0D1117&label=Installs&style=flat-square

XIOC detected URL: https://img.shields.io/visual-studio-marketplace/i/markdown42.markdown42?color=0D1117&label=Installs&style=flat-square

extracted_from_files

URL
detected URL: http://schemas.openxmlformats.org/package/2006/content-types

XIOC detected URL: http://schemas.openxmlformats.org/package/2006/content-types

extracted_from_files

URL
detected URL: http://mathiasbynens.be/notes/javascript-encoding#surrogate-formulae

XIOC detected URL: http://mathiasbynens.be/notes/javascript-encoding#surrogate-formulae

extracted_from_files

URL
detected URL: https://mathiasbynens.be/notes/javascript-encoding

XIOC detected URL: https://mathiasbynens.be/notes/javascript-encoding

extracted_from_files

URL
detected URL: http://www.w3.org/2000/svg

XIOC detected URL: http://www.w3.org/2000/svg

extracted_from_files

URL
detected URL: http://cv.iptc.org/newscodes/digitalsourcetype/trainedAlgorithmicMedia

XIOC detected URL: http://cv.iptc.org/newscodes/digitalsourcetype/trainedAlgorithmicMedia

extracted_from_files

URL
detected URL: http://va.truepic.com/ejbca/publicweb/status/ocsp0

XIOC detected URL: http://va.truepic.com/ejbca/publicweb/status/ocsp0

extracted_from_files

URL
detected URL: https://ezgif.com/video-to-gif

XIOC detected URL: https://ezgif.com/video-to-gif

extracted_from_files

Domain
detected Domain: config.js.map

XIOC detected Domain: config.js.map

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

Domain
detected Domain: marketplace.visualstudio.com

XIOC detected Domain: marketplace.visualstudio.com

extracted_from_files

Domain
detected Domain: img.shields.io

XIOC detected Domain: img.shields.io

extracted_from_files

Domain
detected Domain: schemas.microsoft.com

XIOC detected Domain: schemas.microsoft.com

extracted_from_files

Domain
detected Domain: microsoft.visualstudio.services.links.support

XIOC detected Domain: microsoft.visualstudio.services.links.support

extracted_from_files

Domain
detected Domain: readme.md

XIOC detected Domain: readme.md

extracted_from_files

Domain
detected Domain: markdown42.save

XIOC detected Domain: markdown42.save

extracted_from_files

Domain
detected Domain: extension.js.map

XIOC detected Domain: extension.js.map

extracted_from_files

Domain
detected Domain: ondidchangetreedata.fire

XIOC detected Domain: ondidchangetreedata.fire

extracted_from_files

Domain
detected Domain: headings.map

XIOC detected Domain: headings.map

extracted_from_files

IP
detected IP: ::

XIOC detected IP: ::

extracted_from_files

Domain
detected Domain: markdownparser.js.map

XIOC detected Domain: markdownparser.js.map

extracted_from_files

Domain
detected Domain: object.prototype.hasownproperty.call

XIOC detected Domain: object.prototype.hasownproperty.call

extracted_from_files

Domain
detected Domain: self.re.no

XIOC detected Domain: self.re.no

extracted_from_files

Domain
detected Domain: ondidchange.fire

XIOC detected Domain: ondidchange.fire

extracted_from_files

Domain
detected Domain: document.save

XIOC detected Domain: document.save

extracted_from_files

Domain
detected Domain: documentmodel.js.map

XIOC detected Domain: documentmodel.js.map

extracted_from_files

Domain
detected Domain: model.save

XIOC detected Domain: model.save

extracted_from_files

Domain
detected Domain: markscapeeditor.js.map

XIOC detected Domain: markscapeeditor.js.map

extracted_from_files

Domain
detected Domain: messagebus.js.map

XIOC detected Domain: messagebus.js.map

extracted_from_files

Domain
detected Domain: m.to

XIOC detected Domain: m.to

extracted_from_files

Domain
detected Domain: p.md

XIOC detected Domain: p.md

extracted_from_files

Domain
detected Domain: t.lu

XIOC detected Domain: t.lu

extracted_from_files

Domain
detected Domain: ezgif.com

XIOC detected Domain: ezgif.com

extracted_from_files

Domain
detected Domain: o.pa

XIOC detected Domain: o.pa

extracted_from_files

Domain
detected Domain: 8.bh

XIOC detected Domain: 8.bh

extracted_from_files

Domain
detected Domain: mhm.me

XIOC detected Domain: mhm.me

extracted_from_files

Domain
detected Domain: l.iq

XIOC detected Domain: l.iq

extracted_from_files

Domain
detected Domain: v.fj

XIOC detected Domain: v.fj

extracted_from_files

Domain
detected Domain: v.ch

XIOC detected Domain: v.ch

extracted_from_files

Domain
detected Domain: o.ec

XIOC detected Domain: o.ec

extracted_from_files

Domain
detected Domain: er.es

XIOC detected Domain: er.es

extracted_from_files

Domain
detected Domain: r.mx

XIOC detected Domain: r.mx

extracted_from_files

Domain
detected Domain: ʘ.bd

XIOC detected Domain: ʘ.bd

extracted_from_files

Domain
detected Domain: 9ǽ.bt

XIOC detected Domain: 9ǽ.bt

extracted_from_files

Domain
detected Domain: 8.bs

XIOC detected Domain: 8.bs

extracted_from_files

Domain
detected Domain: i.ug

XIOC detected Domain: i.ug

extracted_from_files

Domain
detected Domain: m.gt

XIOC detected Domain: m.gt

extracted_from_files

Domain
detected Domain: y.ni

XIOC detected Domain: y.ni

extracted_from_files

Domain
detected Domain: f.cz

XIOC detected Domain: f.cz

extracted_from_files

Domain
detected Domain: d.cy

XIOC detected Domain: d.cy

extracted_from_files

Domain
detected Domain: da.de

XIOC detected Domain: da.de

extracted_from_files

Domain
detected Domain: kn.ki

XIOC detected Domain: kn.ki

extracted_from_files

Domain
detected Domain: dr.es

XIOC detected Domain: dr.es

extracted_from_files

Domain
detected Domain: v.bo

XIOC detected Domain: v.bo

extracted_from_files

Domain
detected Domain: 6pdik.sd

XIOC detected Domain: 6pdik.sd

extracted_from_files

IP
detected IP: d::

XIOC detected IP: d::

extracted_from_files

Domain
detected Domain: outlineprovider.js.map

XIOC detected Domain: outlineprovider.js.map

extracted_from_files

Domain
detected Domain: txggd.us

XIOC detected Domain: txggd.us

extracted_from_files

Domain
detected Domain: blockparser.js.map

XIOC detected Domain: blockparser.js.map

extracted_from_files

Domain
detected Domain: b.br

XIOC detected Domain: b.br

extracted_from_files

Domain
detected Domain: j.kr

XIOC detected Domain: j.kr

extracted_from_files

Domain
detected Domain: mj.ve

XIOC detected Domain: mj.ve

extracted_from_files

Domain
detected Domain: i.pr

XIOC detected Domain: i.pr

extracted_from_files

Domain
detected Domain: f.sy

XIOC detected Domain: f.sy

extracted_from_files

Domain
detected Domain: e.sk

XIOC detected Domain: e.sk

extracted_from_files

Domain
detected Domain: ǣ6.sx

XIOC detected Domain: ǣ6.sx

extracted_from_files

Domain
detected Domain: 3.mg

XIOC detected Domain: 3.mg

extracted_from_files

Domain
detected Domain: t.gt

XIOC detected Domain: t.gt

extracted_from_files

Domain
detected Domain: њv.cd

XIOC detected Domain: њv.cd

extracted_from_files

Domain
detected Domain: k.dj

XIOC detected Domain: k.dj

extracted_from_files

Domain
detected Domain: j.ba

XIOC detected Domain: j.ba

extracted_from_files

Domain
detected Domain: renderedblocks.map

XIOC detected Domain: renderedblocks.map

extracted_from_files

Domain
detected Domain: savebtn.id

XIOC detected Domain: savebtn.id

extracted_from_files

Domain
detected Domain: rect.top

XIOC detected Domain: rect.top

extracted_from_files

Domain
detected Domain: editor.js.map

XIOC detected Domain: editor.js.map

extracted_from_files

IP
detected Domain: cv.iptc.org

XIOC detected Domain: cv.iptc.org

extracted_from_files

Domain
detected Domain: c2pa.hash.data

XIOC detected Domain: c2pa.hash.data

extracted_from_files

Domain
detected Domain: va.truepic.com

XIOC detected Domain: va.truepic.com

extracted_from_files

Domain
detected Domain: this.re.email

XIOC detected Domain: this.re.email

extracted_from_files

Domain
detected Domain: keys.map

XIOC detected Domain: keys.map

extracted_from_files

Domain
detected Domain: starts.map

XIOC detected Domain: starts.map

extracted_from_files

Domain
detected Domain: headercells.map

XIOC detected Domain: headercells.map

extracted_from_files

Domain
detected Domain: cells.map

XIOC detected Domain: cells.map

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: h.id

XIOC detected Domain: h.id

extracted_from_files

Domain
detected Domain: re.link

XIOC detected Domain: re.link

extracted_from_files

Domain
detected Domain: re.host

XIOC detected Domain: re.host

extracted_from_files

Domain
detected Domain: self.re.host

XIOC detected Domain: self.re.host

extracted_from_files

Domain
detected Domain: this.re

XIOC detected Domain: this.re

extracted_from_files

Domain
detected Domain: text2.search

XIOC detected Domain: text2.search

extracted_from_files

Domain
detected Domain: this.re.host

XIOC detected Domain: this.re.host

extracted_from_files

IP
detected IP: ::af

XIOC detected IP: ::af

extracted_from_files

IP
detected IP: e::bef

XIOC detected IP: e::bef

extracted_from_files

IP
detected IP: 8::

XIOC detected IP: 8::

extracted_from_files

Domain
detected Domain: opener.open

XIOC detected Domain: opener.open

extracted_from_files

Domain
detected Domain: closer.open

XIOC detected Domain: closer.open

extracted_from_files

IP
detected IP: ed::af

XIOC detected IP: ed::af

extracted_from_files

Domain
detected Domain: self.re

XIOC detected Domain: self.re

extracted_from_files

Domain
detected Domain: re.email

XIOC detected Domain: re.email

extracted_from_files

Domain
detected Domain: o.info

XIOC detected Domain: o.info

extracted_from_files

Domain
detected Domain: c.info

XIOC detected Domain: c.info

extracted_from_files

Domain
detected Domain: to.map

XIOC detected Domain: to.map

extracted_from_files

Domain
detected Domain: tho.map

XIOC detected Domain: tho.map

extracted_from_files

Domain
detected Domain: htro.map

XIOC detected Domain: htro.map

extracted_from_files

Domain
detected Domain: tbo.map

XIOC detected Domain: tbo.map

extracted_from_files

Domain
detected Domain: tro.map

XIOC detected Domain: tro.map

extracted_from_files

Domain
detected Domain: token.info

XIOC detected Domain: token.info

extracted_from_files

Domain
detected Domain: ruler.prototype.at

XIOC detected Domain: ruler.prototype.at

extracted_from_files

Domain
detected Domain: this.map

XIOC detected Domain: this.map

extracted_from_files

Domain
detected Domain: this.info

XIOC detected Domain: this.info

extracted_from_files

Domain
detected Domain: this.md

XIOC detected Domain: this.md

extracted_from_files

Domain
detected Domain: token.map

XIOC detected Domain: token.map

extracted_from_files

Domain
detected Domain: state.md

XIOC detected Domain: state.md

extracted_from_files

Domain
detected Domain: blocks.map

XIOC detected Domain: blocks.map

extracted_from_files

URL
detected Domain: url.search

XIOC detected Domain: url.search

extracted_from_files

Domain
detected Domain: this.search

XIOC detected Domain: this.search

extracted_from_files

Domain
detected Domain: charcodes.zero

XIOC detected Domain: charcodes.zero

extracted_from_files

Domain
detected Domain: object.prototype.tostring.call

XIOC detected Domain: object.prototype.tostring.call

extracted_from_files

Domain
detected Domain: hasownproperty.call

XIOC detected Domain: hasownproperty.call

extracted_from_files

Domain
detected Domain: array.prototype.slice.call

XIOC detected Domain: array.prototype.slice.call

extracted_from_files

IP
detected IP: 7::

XIOC detected IP: 7::

extracted_from_files

IP
detected IP: 6::

XIOC detected IP: 6::

extracted_from_files

IP
detected IP: b::

XIOC detected IP: b::

extracted_from_files

Domain
detected Domain: schemas.openxmlformats.org

XIOC detected Domain: schemas.openxmlformats.org

extracted_from_files

Domain
detected Domain: mathiasbynens.be

XIOC detected Domain: mathiasbynens.be

extracted_from_files

Domain
detected Domain: www.w3.org

XIOC detected Domain: www.w3.org

extracted_from_files

Domain
detected Domain: hasownprop.call

XIOC detected Domain: hasownprop.call

extracted_from_files

Domain
detected Domain: this.re.link

XIOC detected Domain: this.re.link

extracted_from_files

Domain
detected Domain: o.map

XIOC detected Domain: o.map

extracted_from_files

IP
detected IP: ::9

XIOC detected IP: ::9

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Markdown42 — Live Markdown Editor is a Visual Studio Code Marketplace extension published by Shaf. Version 0.1.1 has been analyzed by the Risky Plugins security platform, receiving a risk score of 64.93/100 (MEDIUM risk) based on 181 security findings.

Risk Assessment

This extension presents high security risk. Significant concerns were identified during analysis. It is not recommended for use in sensitive or production environments without thorough review.

Findings Breakdown

  • High: 2 finding(s)
  • Medium: 149 finding(s)
  • Low: 30 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Markdown42 — Live Markdown Editor is published by Shaf on the Visual Studio Code Marketplace marketplace. The extension has approximately 31 users.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions