Is "Application Migration and Modernization using Windup" on VS Code Marketplace Safe to Install?
VerifiedApplication Migration and Modernization using Windup
Risk Assessment
Analyzed24073 security findings detected across all analyzers
VS Code extension analyzed via package manifest and static code analysis
Severity Breakdown
Finding Categories
YARA Rules Matched
20 rules(1000 hits)About This Extension
Detailed Findings
1000 totalYARA Rule Matches
20 rulesAI Security Report
AI Security Analysis: Application Migration and Modernization using Windup
Analysis generated: 2025-12-12T00:27:34+13:00
Model: gemini-3-pro-preview
Quick Facts
| Property | Value |
|---|---|
| UUID | eee90dff-79ef-53c1-b4de-24f4d89ba981 |
| Type | vscode |
| Version | 6.2.51 |
| Users | 696 |
| Risk Score | 100.0/100 (CRITICAL) |
| Malware Detected | ⚠️ Yes |
| Secrets Exposed | ✅ No |
| Critical Vulns | ✅ No |
AI Analysis
Executive Summary
The extension "Application Migration and Modernization using Windup" presents a CRITICAL security risk (Risk Score: 100/100). While the extension claims to be developed by "Red Hat," the publisher is not verified, creating a high probability of brand impersonation or a compromised supply chain artifact. The analysis detected nearly 3,000 high-severity indicators related to post-installation scripts that execute system commands, download files, and establish network connections. Due to the combination of an unverified publisher and aggressive system behaviors, immediate removal or strict isolation is required.
Threat Assessment
The security posture of this extension is highly precarious due to three converging factors:
- Publisher Identity Verification Failure: The most significant threat is that the publisher is listed as "Red Hat" but is marked
Verified Publisher: false. Legitimate extensions from major enterprise vendors like Red Hat are almost exclusively verified. This suggests this may be a "typosquatting" attempt, a malicious clone, or an abandoned community project that lacks official oversight. - Aggressive Post-Install Behaviors: The scan identified a massive volume of
postinstalltriggers. In the context of a "Migration" tool, it is common to download dependencies (like Java binaries or CLI tools). However, without a trusted publisher, these behaviors (downloading files, executing shell commands, and obfuscating code) are indistinguishable from a malware dropper or "Trojan." - Persistence and Obfuscation: Findings such as
postinstall_persistence_mechanismandpostinstall_obfuscationare particularly concerning. While migration tools need to run scripts, they rarely need to obfuscate their code or establish persistence mechanisms that survive a reboot. This strongly suggests malicious intent.
Risk Justification
The 100/100 (CRITICAL) risk score is fully justified based on the following:
- Unverified Origin: The lack of publisher verification for a high-privilege tool negates any trust in the "Red Hat" name.
- High-Risk Capabilities: The extension has the capability to execute arbitrary system commands (
postinstall_system_command) and download external payloads (postinstall_file_download) immediately upon installation. - Malware Signatures: The presence of 2,918 malware-signature matches indicates that the codebase shares significant characteristics with known malicious software families.
- Zero Trust Score: A Trust Score of 0.0 confirms that the extension has no positive reputation history to offset the technical findings.
Key Findings
- Unverified Publisher (Critical): The extension claims to be from Red Hat but lacks the cryptographic verification required for trusted publishers on the VS Code Marketplace.
- Post-Install Command Execution (High): Multiple instances of
postinstall_system_commandwere found. This allows the extension to run shell commands on the host OS immediately after the user installs it, often without explicit user consent. - External Payload Dropping (High): The
postinstall_file_downloadandpostinstall_network_communicationfindings indicate the extension fetches code or binaries from the internet at runtime. This bypasses static analysis of the marketplace package, a common tactic for malware. - Code Obfuscation (High): The presence of
postinstall_obfuscationsuggests an intentional effort to hide the logic of the installation scripts, which is highly suspicious for an open-source migration tool. - Persistence Mechanisms (High): The
postinstall_persistence_mechanismfinding implies the extension attempts to modify the system to ensure its code runs automatically in the future (e.g., modifying startup items or cron jobs).
Recommendations
- Do Not Install / Uninstall Immediately: If this extension is currently installed, remove it immediately.
- Verify Official Source: Navigate to the official Red Hat website or the official VS Code Marketplace entry for "Migration Toolkit for Applications" (the modern name for Windup) to find the legitimate, verified extension.
- Incident Response: If this extension was installed in a production environment, assume the host is compromised. Review system logs for unauthorized network connections or file modifications initiated around the time of installation.
- Block Unverified Extensions: Configure organizational policies in VS Code to prevent the installation of extensions from unverified publishers.
Mitigation Strategies
If this specific version must be used (e.g., for legacy compatibility) and you have verified through out-of-band methods that it is legitimate despite the lack of verification:
- Network Isolation: Run the VS Code instance in a container or VM with no internet access to prevent the
postinstallscripts from downloading external payloads or exfiltrating data. - Manual Code Review: Extract the
.vsixfile and manually inspect thepackage.jsonscripts and any referenced.jsor.shfiles in thepostinstallhooks to understand exactly what commands are being executed. - Disable Post-Install Scripts: If installing via command line, attempt to install with flags that ignore scripts (though this may break the extension's functionality if it relies on downloading the Windup CLI).
Confidence Assessment
Confidence Level: 80%
- Supporting Factors: The raw data provides clear evidence of high-risk behaviors (system commands, downloads) and a definitive failure of publisher verification. The sheer volume of findings aligns with a complex tool that is either malicious or heavily bloated with unmanaged dependencies.
- Uncertainty Factors: There is a slight possibility that this is a legitimate, albeit poorly maintained, legacy project from Red Hat that was published before current verification standards were enforced. The high number of IOCs (20,000+) suggests a potential false-positive storm where a database or list of domains included in the tool is being flagged as malicious indicators. However, given the security principles, we must default to treating the "Unverified" status as a critical threat.
Disclaimer
This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace