Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Eclipse Foundation Enhances Security for VS Code Extensions

Eclipse Foundation Enhances Security for VS Code Extensions

Posted on February 4, 2026 By CWS

Key Points

  • Eclipse Foundation to enforce pre-publish security checks for VS Code extensions.
  • Aims to prevent malicious extensions from entering the Open VSX Registry.
  • New measures include identifying impersonation and accidental credential disclosure.

Introduction of Security Checks for Extensions

The Eclipse Foundation has unveiled new plans to implement security checks prior to the publication of Microsoft Visual Studio Code (VS Code) extensions on the Open VSX Registry. This initiative is part of a strategy to counteract supply chain threats. By shifting from a reactive to a proactive stance, the Foundation aims to prevent malicious extensions from being published.

Christopher Guindon, the director of software development at the Eclipse Foundation, emphasized the need for this change. “Previously, we relied on post-publication measures to remove harmful extensions,” he explained. However, with the increasing volume of publications and evolving threat models, this approach is no longer sufficient.

Addressing Emerging Threats in Open-Source Platforms

Open-source package registries and extension marketplaces have become attractive targets for cybercriminals. These platforms are vulnerable to attacks like namespace impersonation and typosquatting, where attackers exploit subtle naming similarities to deceive users. Recently, an incident was reported where a compromised publisher’s account was used to distribute malicious updates.

The introduction of pre-publish checks aims to limit these risks by flagging suspicious activities. This includes identifying cases of name or namespace impersonation, accidental exposure of credentials, and known malicious patterns. Such measures are designed to quarantine potentially harmful uploads for further review.

Implementation and Future Outlook

Microsoft has already adopted a similar strategy for its Visual Studio Marketplace, employing a multi-step vetting process. This involves scanning incoming packages for malware and conducting regular rescans. Following Microsoft’s example, the Eclipse Foundation plans to roll out its extension verification program in phases.

During February 2026, the Foundation will monitor new extensions without blocking their publication. This period will allow for system fine-tuning, reduction of false positives, and enhancement of feedback mechanisms. The enforcement of these checks is set to commence in March.

The overarching goal is to elevate security standards, assist publishers in early issue detection, and maintain a fair environment for compliant publishers. “Pre-publish checks significantly decrease the chances of malicious extensions entering the ecosystem, thereby boosting confidence in the Open VSX Registry,” Guindon stated.

Conclusion

The Eclipse Foundation’s initiative to enforce pre-publish security checks marks a significant advancement in safeguarding the integrity of VS Code extensions. By proactively identifying and mitigating potential threats, the Foundation strengthens the security framework of the Open VSX Registry and promotes a more secure environment for developers worldwide.

The Hacker News Tags:Eclipse Foundation, Extensions, Malware, Open Source, Open VSX Registry, pre-publish checks, Security, software development, supply chain security, VS Code

Post navigation

Previous Post: Hackers Target React Server Components for Cyber Attacks
Next Post: Vulnerability Exposes Data Leaks in Moltbook AI Network

Related Posts

Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool Malicious Chrome Extension Steals MEXC API Keys by Masquerading as Trading Tool The Hacker News
TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution The Hacker News
Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001) Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001) The Hacker News
CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures CrashFix Chrome Extension Delivers ModeloRAT Using ClickFix-Style Browser Crash Lures The Hacker News
Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices The Hacker News
New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • One Identity Appoints Gihan Munasinghe as New CTO
  • React2Shell Vulnerability Sparks 1.4 Million Exploit Attempts
  • Critical SolarWinds Vulnerability Listed as Actively Exploited
  • Python Infostealers Expanding to macOS via Fake Ads
  • Critical Chrome Update Fixes High-Severity Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • One Identity Appoints Gihan Munasinghe as New CTO
  • React2Shell Vulnerability Sparks 1.4 Million Exploit Attempts
  • Critical SolarWinds Vulnerability Listed as Actively Exploited
  • Python Infostealers Expanding to macOS via Fake Ads
  • Critical Chrome Update Fixes High-Severity Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark