Is "Unit Test for Mainframe" on VS Code Marketplace Safe to Install?
VerifiedCode4z test automation for COBOL applications running on IBM Z that covers unit testing, regression testing, and code coverage. Based on Test4z APIs and runtime from the Broadcom Mainframe DevOps Suit
Risk Assessment
Analyzed15777 security findings detected across all analyzers
VS Code extension analyzed via package manifest and static code analysis
Severity Breakdown
Finding Categories
YARA Rules Matched
15 rules(1000 hits)About This Extension
Detailed Findings
1000 totalYARA Rule Matches
15 rulesAI Security Report
AI Security Analysis: Unit Test for Mainframe
Analysis generated: 2025-12-13T02:08:14+13:00
Model: gemini-3-pro-preview
Quick Facts
| Property | Value |
|---|---|
| UUID | fde3c987-f70d-54ec-8385-f9220a3db806 |
| Type | vscode |
| Version | 1.2.120 |
| Users | 578 |
| Risk Score | 100.0/100 (CRITICAL) |
| Malware Detected | ⚠️ Yes |
| Secrets Exposed | ✅ No |
| Critical Vulns | ✅ No |
AI Analysis
Executive Summary
The "Unit Test for Mainframe" extension (v1.2.120) presents a CRITICAL security risk with a maximum risk score of 100/100. The analysis detected an exceptionally high volume of findings (over 15,000), predominantly related to postinstall scripts that execute system commands, manipulate files, and establish network connections. While the developer is listed as "Broadcom" (a reputable enterprise vendor), the publisher is not verified, and the extension exhibits behaviors indistinguishable from supply chain malware without manual verification. Immediate isolation and manual code review are required before deployment in a production environment.
Threat Assessment
The security posture of this extension is currently alarming due to the aggressive nature of its installation behaviors.
- Supply Chain Risk (Post-Install Scripts): The vast majority of high-severity findings (e.g.,
postinstall_system_command,postinstall_network_communication) indicate that this extension relies heavily on scripts that run automatically upon installation. This is a common vector for supply chain attacks where malicious code is executed on the developer's machine immediately after the extension is downloaded. - Obfuscation Concerns: Findings such as
postinstall_obfuscation(Finding 10, 14, 16) are particularly concerning. While legitimate software may use minification, deliberate obfuscation in installation scripts is often used to hide malicious logic. - System Persistence: Finding 28 (
postinstall_persistence_mechanism) suggests the extension attempts to establish persistence on the host system. This is highly atypical for a standard VSCode extension, which should operate within the lifecycle of the editor. - Unverified Publisher: Despite the developer name "Broadcom," the "Verified Publisher: false" status indicates that the marketplace identity has not been cryptographically validated. This raises the risk of brand impersonation (typosquatting).
Risk Justification
The 100/100 Risk Score is justified based on the following factors:
- Severity of Indicators: The presence of over 3,000 HIGH-severity findings related to system command execution and file manipulation triggers maximum risk thresholds.
- Behavioral Profile: The combination of network access, file system modification, and obfuscation within installation scripts matches the behavioral profile of malware, even if the intent is legitimate (e.g., downloading dependencies).
- Volume of Findings: 15,777 total findings suggest a massive, likely unvetted dependency tree (node_modules) is included in the package, increasing the attack surface significantly.
- Lack of Trust: The Trust Score of 0/100 reflects the unverified publisher status combined with the aggressive permissions requested.
Key Findings
- Aggressive Post-Install Execution (Findings 2, 3, 7, 9, etc.): The extension triggers system-level commands immediately after installation. This bypasses standard user consent flows for specific actions.
- Network Activity During Install (Findings 4, 8, 12, etc.): The extension initiates network connections during the installation phase. This is often used to download secondary payloads or exfiltrate environment data.
- Code Obfuscation (Findings 10, 14, 16): Scripts within the package are obfuscated, hindering static analysis and raising the probability of hidden malicious functionality.
- Persistence Mechanisms (Finding 28): The analysis detected code patterns associated with establishing persistence on the host operating system, a behavior rarely required for legitimate IDE plugins.
- Crypto Operations (Finding 27): The presence of cryptographic operations in install scripts could indicate anything from legitimate checksum verification to ransomware-like behavior or encrypted C2 communication.
Recommendations
- Do Not Deploy: Do not install this extension in a production or sensitive environment until the "Verified Publisher" status is resolved or a manual audit is complete.
- Verify Source: Contact Broadcom support or check their official documentation to verify if this specific UUID (
fde3c987-f70d-54ec-8385-f9220a3db806) is their official release. The lack of verification is a major red flag. - Sandbox Analysis: If this tool is required, install it first in an isolated, disposable Virtual Machine (VM) or container. Monitor network traffic and file system changes during the installation process to identify what external resources are being accessed.
- Dependency Audit: The high finding count suggests a bloated
node_modulesfolder. A manual review of the extension's manifest and dependencies is necessary to ensure no known vulnerable or malicious packages are included.
Mitigation Strategies
If business requirements mandate the use of this specific extension version:
- Network Isolation: Configure the VSCode environment or the host machine's firewall to block all external traffic from the extension process, except for whitelisted domains explicitly required for the mainframe connection.
- Disable Post-Install Scripts: If installing via command line (vsce), attempt to install with flags that ignore scripts (
--ignore-scripts), though this may break functionality if the extension relies on them to download binaries. - Least Privilege: Ensure the user account running VSCode has restricted permissions. It should not have root/admin access, limiting the impact of the
postinstall_system_commandfindings.
Confidence Assessment
Confidence Level: 80%
I am confident in the detection of these behaviors (the scripts exist and perform these actions). However, there is a margin of uncertainty regarding intent. It is plausible that this is a legitimate, albeit poorly architected, enterprise tool that downloads heavy dependencies (Java runtimes, mainframe connectors) during install, which triggers malware heuristics. The "Verified Publisher: false" status is the strongest indicator that caution is warranted.
Disclaimer
This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.
Source Code Not Available
Source code is not available for this version of the extension.
Frequently Asked Questions
Similar Extensions
Related extensions from the same publisher or marketplace
Endevor Explorer
test_Broadcom
BDD Test Runner
rohit sakhawalkar
TScanner
lucasvtiradentes
Azure DevOps Pipelines
Damilola Onadeinde
Copilot MCP + Agent Skills Manager
Automata Labs
Unit Test MCP
Kenneth Huang