No Comments

Open VSX Takes Action Following Token Exposure in VS Code Marketplace Extensions

 

The Eclipse Foundation, which maintains the open-source Open VSX project, announced that it has revoked a small number of tokens leaked within Visual Studio Code (VS Code) extensions published in the marketplace.

This action follows a report from cloud security company Wiz earlier this month. Wiz discovered several extensions from both Microsoft’s VS Code Marketplace and Open VSX that inadvertently exposed their access tokens within public repositories. As a result, malicious actors could have seized control and distributed malware, effectively poisoning the extension supply chain.

“Upon investigation, we confirmed that a small number of tokens had been leaked and could potentially be abused to publish or modify extensions,” said Mikaël Barbero, head of security at the Eclipse Foundation. “These exposures were caused by developer mistakes, not a compromise of the Open VSX infrastructure.”

To strengthen security, Open VSX introduced a new token prefix format, ovsxp_, in collaboration with the Microsoft Security Response Center (MSRC). This update makes it easier to scan for exposed tokens across public repositories.

In addition, the registry maintainers identified and removed all extensions recently flagged by Koi Security in a campaign called “GlassWorm.” They emphasized that the malware distributed through this activity was not a “self-replicating worm,” as it must first steal developer credentials before spreading further.

“We also believe that the reported download count of 35,800 overstates the actual number of affected users, as it includes inflated downloads generated by bots and visibility-boosting tactics used by the threat actors,” Barbero added.

Open VSX continues to implement new security measures to strengthen the software supply chain. These include:

  • Reducing token lifetime limits by default to minimize the impact of accidental leaks
  • Simplifying token revocation once a leak is reported
  • Automating extension scans at publication to detect malicious code patterns or embedded secrets

These measures aim to improve the ecosystem’s cyber resilience at a time when software suppliers and developers face increasing attacks. Such incidents allow threat actors deep and persistent access to enterprise environments.

“Incidents like this remind us that supply chain security is a shared responsibility: from publishers managing their tokens carefully, to registry maintainers improving detection and response capabilities,” Barbero said.

 


Source: TheHackerNews

Read more at Impreza News

You might also like

More Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.