Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Eclipse Foundation Enhances Security for VS Code Extensions

Eclipse Foundation Enhances Security for VS Code Extensions

Posted on February 4, 2026 By CWS

Key Points

  • Eclipse Foundation to enforce pre-publish security checks for VS Code extensions.
  • Aims to prevent malicious extensions from entering the Open VSX Registry.
  • New measures include identifying impersonation and accidental credential disclosure.

Introduction of Security Checks for Extensions

The Eclipse Foundation has unveiled new plans to implement security checks prior to the publication of Microsoft Visual Studio Code (VS Code) extensions on the Open VSX Registry. This initiative is part of a strategy to counteract supply chain threats. By shifting from a reactive to a proactive stance, the Foundation aims to prevent malicious extensions from being published.

Christopher Guindon, the director of software development at the Eclipse Foundation, emphasized the need for this change. “Previously, we relied on post-publication measures to remove harmful extensions,” he explained. However, with the increasing volume of publications and evolving threat models, this approach is no longer sufficient.

Addressing Emerging Threats in Open-Source Platforms

Open-source package registries and extension marketplaces have become attractive targets for cybercriminals. These platforms are vulnerable to attacks like namespace impersonation and typosquatting, where attackers exploit subtle naming similarities to deceive users. Recently, an incident was reported where a compromised publisher’s account was used to distribute malicious updates.

The introduction of pre-publish checks aims to limit these risks by flagging suspicious activities. This includes identifying cases of name or namespace impersonation, accidental exposure of credentials, and known malicious patterns. Such measures are designed to quarantine potentially harmful uploads for further review.

Implementation and Future Outlook

Microsoft has already adopted a similar strategy for its Visual Studio Marketplace, employing a multi-step vetting process. This involves scanning incoming packages for malware and conducting regular rescans. Following Microsoft’s example, the Eclipse Foundation plans to roll out its extension verification program in phases.

During February 2026, the Foundation will monitor new extensions without blocking their publication. This period will allow for system fine-tuning, reduction of false positives, and enhancement of feedback mechanisms. The enforcement of these checks is set to commence in March.

The overarching goal is to elevate security standards, assist publishers in early issue detection, and maintain a fair environment for compliant publishers. “Pre-publish checks significantly decrease the chances of malicious extensions entering the ecosystem, thereby boosting confidence in the Open VSX Registry,” Guindon stated.

Conclusion

The Eclipse Foundation’s initiative to enforce pre-publish security checks marks a significant advancement in safeguarding the integrity of VS Code extensions. By proactively identifying and mitigating potential threats, the Foundation strengthens the security framework of the Open VSX Registry and promotes a more secure environment for developers worldwide.

The Hacker News Tags:Eclipse Foundation, Extensions, Malware, Open Source, Open VSX Registry, pre-publish checks, Security, software development, supply chain security, VS Code

Post navigation

Previous Post: Hackers Target React Server Components for Cyber Attacks
Next Post: Vulnerability Exposes Data Leaks in Moltbook AI Network

Related Posts

Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks The Hacker News
GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets The Hacker News
Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys The Hacker News
New n8n Vulnerability (9.9 CVSS) Lets Authenticated Users Execute System Commands New n8n Vulnerability (9.9 CVSS) Lets Authenticated Users Execute System Commands The Hacker News
Automating vCISO and Compliance Services Automating vCISO and Compliance Services The Hacker News
Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News