Is "Unit Test for Mainframe" on VS Code Marketplace Safe to Install?

Verified
Broadcom · vscode · v1.2.120

Code4z test automation for COBOL applications running on IBM Z that covers unit testing, regression testing, and code coverage. Based on Test4z APIs and runtime from the Broadcom Mainframe DevOps Suit

Risk Assessment

Analyzed
63.05
out of 100
MEDIUM

15777 security findings detected across all analyzers

VS Code extension analyzed via package manifest and static code analysis

Severity Breakdown

0
Critical
3318
High
12454
Medium
5
Low
0
Info

Finding Categories

1000
Malware Signatures

YARA Rules Matched

15 rules(1000 hits)
postinstall network communication postinstall file manipulation postinstall crypto operations postinstall file download postinstall system command postinstall persistence mechanism postinstall registry modification postinstall obfuscation credential env files NoUseWeakRandom postinstall environment access UsingCommandLineArguments DebuggerStatementsShouldNotBeUsed UsingShellInterpreterWhenExecutingOSCommands AlertStatementsShouldNotBeUsed

About This Extension

Code4z test automation for COBOL applications running on IBM Z that covers unit testing, regression testing, and code coverage. Based on Test4z APIs and runtime from the Broadcom Mainframe DevOps Suit

Detailed Findings

1000 total

YARA Rule Matches

15 rules

AI Security Report

AI Security Analysis: Unit Test for Mainframe

Analysis generated: 2025-12-13T02:08:14+13:00
Model: gemini-3-pro-preview


Quick Facts

Property Value
UUID fde3c987-f70d-54ec-8385-f9220a3db806
Type vscode
Version 1.2.120
Users 578
Risk Score 100.0/100 (CRITICAL)
Malware Detected ⚠️ Yes
Secrets Exposed ✅ No
Critical Vulns ✅ No

AI Analysis

Executive Summary

The "Unit Test for Mainframe" extension (v1.2.120) presents a CRITICAL security risk with a maximum risk score of 100/100. The analysis detected an exceptionally high volume of findings (over 15,000), predominantly related to postinstall scripts that execute system commands, manipulate files, and establish network connections. While the developer is listed as "Broadcom" (a reputable enterprise vendor), the publisher is not verified, and the extension exhibits behaviors indistinguishable from supply chain malware without manual verification. Immediate isolation and manual code review are required before deployment in a production environment.

Threat Assessment

The security posture of this extension is currently alarming due to the aggressive nature of its installation behaviors.

  • Supply Chain Risk (Post-Install Scripts): The vast majority of high-severity findings (e.g., postinstall_system_command, postinstall_network_communication) indicate that this extension relies heavily on scripts that run automatically upon installation. This is a common vector for supply chain attacks where malicious code is executed on the developer's machine immediately after the extension is downloaded.
  • Obfuscation Concerns: Findings such as postinstall_obfuscation (Finding 10, 14, 16) are particularly concerning. While legitimate software may use minification, deliberate obfuscation in installation scripts is often used to hide malicious logic.
  • System Persistence: Finding 28 (postinstall_persistence_mechanism) suggests the extension attempts to establish persistence on the host system. This is highly atypical for a standard VSCode extension, which should operate within the lifecycle of the editor.
  • Unverified Publisher: Despite the developer name "Broadcom," the "Verified Publisher: false" status indicates that the marketplace identity has not been cryptographically validated. This raises the risk of brand impersonation (typosquatting).

Risk Justification

The 100/100 Risk Score is justified based on the following factors:

  1. Severity of Indicators: The presence of over 3,000 HIGH-severity findings related to system command execution and file manipulation triggers maximum risk thresholds.
  2. Behavioral Profile: The combination of network access, file system modification, and obfuscation within installation scripts matches the behavioral profile of malware, even if the intent is legitimate (e.g., downloading dependencies).
  3. Volume of Findings: 15,777 total findings suggest a massive, likely unvetted dependency tree (node_modules) is included in the package, increasing the attack surface significantly.
  4. Lack of Trust: The Trust Score of 0/100 reflects the unverified publisher status combined with the aggressive permissions requested.

Key Findings

  • Aggressive Post-Install Execution (Findings 2, 3, 7, 9, etc.): The extension triggers system-level commands immediately after installation. This bypasses standard user consent flows for specific actions.
  • Network Activity During Install (Findings 4, 8, 12, etc.): The extension initiates network connections during the installation phase. This is often used to download secondary payloads or exfiltrate environment data.
  • Code Obfuscation (Findings 10, 14, 16): Scripts within the package are obfuscated, hindering static analysis and raising the probability of hidden malicious functionality.
  • Persistence Mechanisms (Finding 28): The analysis detected code patterns associated with establishing persistence on the host operating system, a behavior rarely required for legitimate IDE plugins.
  • Crypto Operations (Finding 27): The presence of cryptographic operations in install scripts could indicate anything from legitimate checksum verification to ransomware-like behavior or encrypted C2 communication.

Recommendations

  1. Do Not Deploy: Do not install this extension in a production or sensitive environment until the "Verified Publisher" status is resolved or a manual audit is complete.
  2. Verify Source: Contact Broadcom support or check their official documentation to verify if this specific UUID (fde3c987-f70d-54ec-8385-f9220a3db806) is their official release. The lack of verification is a major red flag.
  3. Sandbox Analysis: If this tool is required, install it first in an isolated, disposable Virtual Machine (VM) or container. Monitor network traffic and file system changes during the installation process to identify what external resources are being accessed.
  4. Dependency Audit: The high finding count suggests a bloated node_modules folder. A manual review of the extension's manifest and dependencies is necessary to ensure no known vulnerable or malicious packages are included.

Mitigation Strategies

If business requirements mandate the use of this specific extension version:

  1. Network Isolation: Configure the VSCode environment or the host machine's firewall to block all external traffic from the extension process, except for whitelisted domains explicitly required for the mainframe connection.
  2. Disable Post-Install Scripts: If installing via command line (vsce), attempt to install with flags that ignore scripts (--ignore-scripts), though this may break functionality if the extension relies on them to download binaries.
  3. Least Privilege: Ensure the user account running VSCode has restricted permissions. It should not have root/admin access, limiting the impact of the postinstall_system_command findings.

Confidence Assessment

Confidence Level: 80%

I am confident in the detection of these behaviors (the scripts exist and perform these actions). However, there is a margin of uncertainty regarding intent. It is plausible that this is a legitimate, albeit poorly architected, enterprise tool that downloads heavy dependencies (Java runtimes, mainframe connectors) during install, which triggers malware heuristics. The "Verified Publisher: false" status is the strongest indicator that caution is warranted.


Disclaimer

This analysis was generated by an AI model and should be reviewed by security professionals. The findings are based on automated security scanning and may include false positives. Always verify critical findings manually before taking action.

Frequently Asked Questions