Is "Application Migration and Modernization using Windup" on VS Code Marketplace Safe to Install?

Verified
Red Hat · vscode · v6.2.51

Application Migration and Modernization using Windup

Risk Assessment

Analyzed
98.27
out of 100
CRITICAL

24073 security findings detected across all analyzers

VS Code extension analyzed via package manifest and static code analysis

Severity Breakdown

0
Critical
2918
High
21133
Medium
22
Low
0
Info

Finding Categories

1000
Malware Signatures

YARA Rules Matched

20 rules(1000 hits)
postinstall obfuscation credential env files postinstall network communication postinstall file manipulation postinstall registry modification postinstall file download postinstall system command postinstall crypto operations UsingCommandLineArguments RedirectToUnknownPath StaticallyServingHiddenFilesIsSecuritySensitive postinstall environment access UsingShellInterpreterWhenExecutingOSCommands postinstall persistence mechanism DebuggerStatementsShouldNotBeUsed NoUseWeakRandom +4 more

About This Extension

Application Migration and Modernization using Windup

Detailed Findings

1000 total

YARA Rule Matches

20 rules

AI Security Report

AI Security Analysis: Application Migration and Modernization using Windup

Analysis generated: 2025-12-12T00:27:34+13:00
Model: gemini-3-pro-preview


Quick Facts

Property Value
UUID eee90dff-79ef-53c1-b4de-24f4d89ba981
Type vscode
Version 6.2.51
Users 696
Risk Score 100.0/100 (CRITICAL)
Malware Detected ⚠️ Yes
Secrets Exposed ✅ No
Critical Vulns ✅ No

AI Analysis

Executive Summary

The extension "Application Migration and Modernization using Windup" presents a CRITICAL security risk (Risk Score: 100/100). While the extension claims to be developed by "Red Hat," the publisher is not verified, creating a high probability of brand impersonation or a compromised supply chain artifact. The analysis detected nearly 3,000 high-severity indicators related to post-installation scripts that execute system commands, download files, and establish network connections. Due to the combination of an unverified publisher and aggressive system behaviors, immediate removal or strict isolation is required.

Threat Assessment

The security posture of this extension is highly precarious due to three converging factors:

  1. Publisher Identity Verification Failure: The most significant threat is that the publisher is listed as "Red Hat" but is marked Verified Publisher: false. Legitimate extensions from major enterprise vendors like Red Hat are almost exclusively verified. This suggests this may be a "typosquatting" attempt, a malicious clone, or an abandoned community project that lacks official oversight.
  2. Aggressive Post-Install Behaviors: The scan identified a massive volume of postinstall triggers. In the context of a "Migration" tool, it is common to download dependencies (like Java binaries or CLI tools). However, without a trusted publisher, these behaviors (downloading files, executing shell commands, and obfuscating code) are indistinguishable from a malware dropper or "Trojan."
  3. Persistence and Obfuscation: Findings such as postinstall_persistence_mechanism and postinstall_obfuscation are particularly concerning. While migration tools need to run scripts, they rarely need to obfuscate their code or establish persistence mechanisms that survive a reboot. This strongly suggests malicious intent.

Risk Justification

The 100/100 (CRITICAL) risk score is fully justified based on the following:

  • Unverified Origin: The lack of publisher verification for a high-privilege tool negates any trust in the "Red Hat" name.
  • High-Risk Capabilities: The extension has the capability to execute arbitrary system commands (postinstall_system_command) and download external payloads (postinstall_file_download) immediately upon installation.
  • Malware Signatures: The presence of 2,918 malware-signature matches indicates that the codebase shares significant characteristics with known malicious software families.
  • Zero Trust Score: A Trust Score of 0.0 confirms that the extension has no positive reputation history to offset the technical findings.

Key Findings

  • Unverified Publisher (Critical): The extension claims to be from Red Hat but lacks the cryptographic verification required for trusted publishers on the VS Code Marketplace.
  • Post-Install Command Execution (High): Multiple instances of postinstall_system_command were found. This allows the extension to run shell commands on the host OS immediately after the user installs it, often without explicit user consent.
  • External Payload Dropping (High): The postinstall_file_download and postinstall_network_communication findings indicate the extension fetches code or binaries from the internet at runtime. This bypasses static analysis of the marketplace package, a common tactic for malware.
  • Code Obfuscation (High): The presence of postinstall_obfuscation suggests an intentional effort to hide the logic of the installation scripts, which is highly suspicious for an open-source migration tool.
  • Persistence Mechanisms (High): The postinstall_persistence_mechanism finding implies the extension attempts to modify the system to ensure its code runs automatically in the future (e.g., modifying startup items or cron jobs).

Recommendations

  1. Do Not Install / Uninstall Immediately: If this extension is currently installed, remove it immediately.
  2. Verify Official Source: Navigate to the official Red Hat website or the official VS Code Marketplace entry for "Migration Toolkit for Applications" (the modern name for Windup) to find the legitimate, verified extension.
  3. Incident Response: If this extension was installed in a production environment, assume the host is compromised. Review system logs for unauthorized network connections or file modifications initiated around the time of installation.
  4. Block Unverified Extensions: Configure organizational policies in VS Code to prevent the installation of extensions from unverified publishers.

Mitigation Strategies

If this specific version must be used (e.g., for legacy compatibility) and you have verified through out-of-band methods that it is legitimate despite the lack of verification:

  1. Network Isolation: Run the VS Code instance in a container or VM with no internet access to prevent the postinstall scripts from downloading external payloads or exfiltrating data.
  2. Manual Code Review: Extract the .vsix file and manually inspect the package.json scripts and any referenced .js or .sh files in the postinstall hooks to understand exactly what commands are being executed.
  3. Disable Post-Install Scripts: If installing via command line, attempt to install with flags that ignore scripts (though this may break the extension's functionality if it relies on downloading the Windup CLI).

Confidence Assessment

Confidence Level: 80%

  • Supporting Factors: The raw data provides clear evidence of high-risk behaviors (system commands, downloads) and a definitive failure of publisher verification. The sheer volume of findings aligns with a complex tool that is either malicious or heavily bloated with unmanaged dependencies.
  • Uncertainty Factors: There is a slight possibility that this is a legitimate, albeit poorly maintained, legacy project from Red Hat that was published before current verification standards were enforced. The high number of IOCs (20,000+) suggests a potential false-positive storm where a database or list of domains included in the tool is being flagged as malicious indicators. However, given the security principles, we must default to treating the "Unverified" status as a critical threat.

Disclaimer

This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.

Frequently Asked Questions