Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names

S Haynes
6 Min Read

Introduction: Cybersecurity researchers have identified a vulnerability within the Visual Studio Code (VS Code) Marketplace that enables malicious actors to re-register extensions that were previously removed, using the exact same names. This discovery raises significant concerns regarding software supply chain security, as it creates an avenue for attackers to impersonate legitimate or previously trusted extensions, potentially leading to the distribution of malware or the compromise of developer systems. The implication is that developers may inadvertently install malicious code believing it to be a familiar or legitimate tool.

In-Depth Analysis: The core of the discovered flaw lies in the VS Code Marketplace’s process for handling the removal and subsequent re-publication of extensions. Software supply chain security firm ReversingLabs is credited with uncovering this loophole. Their investigation began after they detected a malicious extension identified as “ahbanC.shiba.” This particular extension exhibited behavior similar to two other extensions, named “ahban.shiba” and “ahban.cychelloworld.” The critical insight from ReversingLabs is that the marketplace mechanism apparently allows for the reuse of extension identifiers, including names, even after those extensions have been taken down, presumably due to policy violations or security concerns (https://thehackernews.com/2025/08/researchers-find-vs-code-flaw-allowing.html). This suggests a potential gap in how the marketplace manages namespaces and validates the history of extension identifiers. The ability for attackers to re-register a previously removed extension under its original name presents a clear social engineering vector. Developers often rely on familiar extension names for their functionality and reputation. If a malicious actor can leverage a known, albeit previously deleted, name, they can exploit the trust developers have in that name to distribute harmful code. The analysis indicates that the mechanism doesn’t adequately prevent the re-appropriation of these identifiers, creating a persistent risk in the software supply chain. The methodology employed by ReversingLabs involved identifying the malicious extension and then tracing its characteristics back to similar, previously identified extensions. This comparative analysis likely revealed the shared identifiers and the potential for their reuse. The findings highlight a vulnerability in the lifecycle management of extensions within the VS Code ecosystem, specifically concerning the post-removal re-registration process.

Pros and Cons: The primary “pro” stemming from this discovery is the increased awareness it brings to a critical software supply chain security issue within the VS Code ecosystem. By identifying and reporting this flaw, ReversingLabs and The Hacker News are enabling the VS Code development team and the broader developer community to address a potential threat. This proactive disclosure allows for the development and implementation of corrective measures to prevent exploitation. The “con” is the inherent risk that this vulnerability poses to developers until it is fully mitigated. The ability for attackers to impersonate deleted extensions means that developers could be unknowingly downloading and integrating malicious code into their workflows. This could lead to data breaches, system compromise, or the further propagation of malware within development environments. The reliance on extension names as trust indicators is undermined, creating a scenario where established naming conventions can be weaponized.

Key Takeaways:

  • A vulnerability exists in the VS Code Marketplace allowing for the reuse of deleted extension names.
  • This flaw enables threat actors to impersonate previously removed extensions, potentially distributing malware.
  • The discovery was made by ReversingLabs, who identified a malicious extension mimicking others.
  • The mechanism for managing extension identifiers after removal is a point of concern for software supply chain security.
  • Developers may be deceived into installing malicious extensions by their familiar, re-registered names.
  • The vulnerability highlights the need for robust validation and lifecycle management of extension identifiers in marketplaces.

Call to Action: Educated readers should remain vigilant regarding extensions they install or continue to use within Visual Studio Code. It is advisable to monitor official communications from Microsoft regarding any patches or security advisories related to the VS Code Marketplace. Developers should also consider implementing additional security checks and validation processes for third-party extensions, rather than solely relying on extension names. Investigating the reputation and source of extensions, especially those that seem to reappear after a period of absence or are from less-known publishers, is a prudent step. Further reporting from cybersecurity firms and Microsoft on the mitigation strategies and their effectiveness should be closely watched.

Annotations/Citations: The information regarding the VS Code Marketplace flaw allowing attackers to republish deleted extensions under the same names is reported by The Hacker News, citing cybersecurity researchers from ReversingLabs (https://thehackernews.com/2025/08/researchers-find-vs-code-flaw-allowing.html). ReversingLabs identified a malicious extension named “ahbanC.shiba” that exhibited functional similarities to previously removed extensions, “ahban.shiba” and “ahban.cychelloworld” (https://thehackernews.com/2025/08/researchers-find-vs-code-flaw-allowing.html).

Share This Article
Leave a Comment

Leave a Reply

Your email address will not be published. Required fields are marked *