• Skydancer@pawb.social
    link
    fedilink
    arrow-up
    12
    ·
    5 months ago

    Except their summary is wrong. The researchers went on to search other extensions for known malicious code, and found it in thousands of extensions with tens of millions of total installs.

    • Kuinox@lemmy.world
      link
      fedilink
      arrow-up
      0
      arrow-down
      5
      ·
      5 months ago

      I hopped people here would notice that their “malicious code” detection is totally bogus when the malicious code highlighted hit a local IP address.

      • Skydancer@pawb.social
        link
        fedilink
        arrow-up
        2
        ·
        5 months ago

        Good point. That was in the “static IP” category and not counted in the 200+ million install “malicious code” category, though. It could be a warning sign of false positives, but the example was such a small snippet it could also be opening after a VPN is established. That example was supposedly part of code that opens a connection for shell access from the other end, but without more details it’s not really possible to say.

        • Kuinox@lemmy.world
          link
          fedilink
          arrow-up
          1
          arrow-down
          2
          ·
          5 months ago

          Tons of devtools summons cmd.exe and do networks. Their claim is that more than 10% of the vscode marketplate is malicious package (i just divided the number of extensions they says is malicious, by the number of extensions)