OX’s research, has revealed serious security flaws in the way that popular Integrated Development Environments (IDEs) like Visual Studio Code, Visual Studio, and IntelliJ IDEA verify their extensions. This news could have a significant impact on software development teams around the world and change their security policies.
The findings unveil how attackers can craft malicious extensions that appear fully verified and trustworthy, enabling unauthorized code to be executed on developer workstations with alarming ease.

Vulnerabilities in Extension Verification Processes
IDEs play a pivotal role in modern programming by offering comprehensive environments where code is written, tested, and debugged efficiently.
Their capabilities often rely on third-party extensions sourced from official marketplaces and external platforms like GitHub, creating a sprawling risk landscape.
Any vulnerability in the extension verification process of these platforms can, therefore, have far-reaching consequences, potentially exposing vast swathes of the development community to sophisticated attacks.
The OX research team sought to validate these concerns by creating intentionally malicious extensions for three top IDEs: Visual Studio Code, Visual Studio, and IntelliJ IDEA.
These test extensions, which were engineered to open the system calculator as a harmless proof of concept, appeared indistinguishable from legitimate, verified extensions.
They retained all the hallmarks of trust, including authentic-looking download numbers, user ratings, and crucially, the coveted blue “verified” badge.
False Sense of Security
Focusing first on Visual Studio Code, the world’s most widely used code editor, the researchers dissected the traffic exchanged with Microsoft’s extension marketplace.
They discovered that Visual Studio Code’s verification check hinges on a request to Microsoft’s servers, assessing extension legitimacy based on publisher credentials and metadata.
However, the verification process only checks if the publisher is verified, not whether the extension bundle itself is secure or unchanged.
By manipulating internal files within the extension package specifically, copying verifiable values associated with trusted extensions attackers can forge a VSIX file that will retain the trusted status even after adding arbitrary, potentially malicious, functionality.
This flaw becomes especially dangerous when developers source extensions outside official marketplaces, such as downloading VSIX or ZIP packages directly from GitHub.

Under these circumstances, the forged extension preserves its “verified” badge, tricking developers into installing and running malicious code under the guise of a trusted extension.
The problem is not confined to Visual Studio Code; similar issues were observed in Visual Studio, IntelliJ IDEA, and Cursor, as each IDE’s extension system relies on comparable verification mechanisms that can be subverted by manipulating extension metadata.
The implications of this vulnerability are profound. Not only have attackers been shown to bypass trust mechanisms, but the widespread habit among developers to trust “verified” badges means that even cautious professionals could unwittingly compromise their own environments.
Since extensions can execute arbitrary code, a compromised development environment could become a launchpad for far more damaging attacks, including data theft, ransomware deployment, or the insertion of supply-chain malware into critical software projects.
According to the Report, As OX’s research demonstrates, the current approach to extension verification is insufficient against determined adversaries capable of crafting deceptive, malicious packages.
It is a stark warning for the software development ecosystem: relying solely on verified publisher icons is no longer a safe practice.
Developers are advised to exercise heightened caution with third-party extensions, vet sources thoroughly, and await security patches addressing these deep-rooted verification flaws across IDE platforms.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates