Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Eclipse Foundation Enhances Security for VS Code Extensions

Eclipse Foundation Enhances Security for VS Code Extensions

Posted on February 4, 2026 By CWS

Key Points

  • Eclipse Foundation to enforce pre-publish security checks for VS Code extensions.
  • Aims to prevent malicious extensions from entering the Open VSX Registry.
  • New measures include identifying impersonation and accidental credential disclosure.

Introduction of Security Checks for Extensions

The Eclipse Foundation has unveiled new plans to implement security checks prior to the publication of Microsoft Visual Studio Code (VS Code) extensions on the Open VSX Registry. This initiative is part of a strategy to counteract supply chain threats. By shifting from a reactive to a proactive stance, the Foundation aims to prevent malicious extensions from being published.

Christopher Guindon, the director of software development at the Eclipse Foundation, emphasized the need for this change. “Previously, we relied on post-publication measures to remove harmful extensions,” he explained. However, with the increasing volume of publications and evolving threat models, this approach is no longer sufficient.

Addressing Emerging Threats in Open-Source Platforms

Open-source package registries and extension marketplaces have become attractive targets for cybercriminals. These platforms are vulnerable to attacks like namespace impersonation and typosquatting, where attackers exploit subtle naming similarities to deceive users. Recently, an incident was reported where a compromised publisher’s account was used to distribute malicious updates.

The introduction of pre-publish checks aims to limit these risks by flagging suspicious activities. This includes identifying cases of name or namespace impersonation, accidental exposure of credentials, and known malicious patterns. Such measures are designed to quarantine potentially harmful uploads for further review.

Implementation and Future Outlook

Microsoft has already adopted a similar strategy for its Visual Studio Marketplace, employing a multi-step vetting process. This involves scanning incoming packages for malware and conducting regular rescans. Following Microsoft’s example, the Eclipse Foundation plans to roll out its extension verification program in phases.

During February 2026, the Foundation will monitor new extensions without blocking their publication. This period will allow for system fine-tuning, reduction of false positives, and enhancement of feedback mechanisms. The enforcement of these checks is set to commence in March.

The overarching goal is to elevate security standards, assist publishers in early issue detection, and maintain a fair environment for compliant publishers. “Pre-publish checks significantly decrease the chances of malicious extensions entering the ecosystem, thereby boosting confidence in the Open VSX Registry,” Guindon stated.

Conclusion

The Eclipse Foundation’s initiative to enforce pre-publish security checks marks a significant advancement in safeguarding the integrity of VS Code extensions. By proactively identifying and mitigating potential threats, the Foundation strengthens the security framework of the Open VSX Registry and promotes a more secure environment for developers worldwide.

The Hacker News Tags:Eclipse Foundation, Extensions, Malware, Open Source, Open VSX Registry, pre-publish checks, Security, software development, supply chain security, VS Code

Post navigation

Previous Post: Hackers Target React Server Components for Cyber Attacks
Next Post: Vulnerability Exposes Data Leaks in Moltbook AI Network

Related Posts

Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month The Hacker News
AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs The Hacker News
RondoDox Botnet Exploits Critical React2Shell Flaw to Hijack IoT Devices and Web Servers RondoDox Botnet Exploits Critical React2Shell Flaw to Hijack IoT Devices and Web Servers The Hacker News
CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks The Hacker News
The Hidden Risk of Orphan Accounts The Hidden Risk of Orphan Accounts The Hacker News
New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News