Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Eclipse Foundation Enhances Security for VS Code Extensions

Eclipse Foundation Enhances Security for VS Code Extensions

Posted on February 4, 2026 By CWS

Key Points

  • Eclipse Foundation to enforce pre-publish security checks for VS Code extensions.
  • Aims to prevent malicious extensions from entering the Open VSX Registry.
  • New measures include identifying impersonation and accidental credential disclosure.

Introduction of Security Checks for Extensions

The Eclipse Foundation has unveiled new plans to implement security checks prior to the publication of Microsoft Visual Studio Code (VS Code) extensions on the Open VSX Registry. This initiative is part of a strategy to counteract supply chain threats. By shifting from a reactive to a proactive stance, the Foundation aims to prevent malicious extensions from being published.

Christopher Guindon, the director of software development at the Eclipse Foundation, emphasized the need for this change. “Previously, we relied on post-publication measures to remove harmful extensions,” he explained. However, with the increasing volume of publications and evolving threat models, this approach is no longer sufficient.

Addressing Emerging Threats in Open-Source Platforms

Open-source package registries and extension marketplaces have become attractive targets for cybercriminals. These platforms are vulnerable to attacks like namespace impersonation and typosquatting, where attackers exploit subtle naming similarities to deceive users. Recently, an incident was reported where a compromised publisher’s account was used to distribute malicious updates.

The introduction of pre-publish checks aims to limit these risks by flagging suspicious activities. This includes identifying cases of name or namespace impersonation, accidental exposure of credentials, and known malicious patterns. Such measures are designed to quarantine potentially harmful uploads for further review.

Implementation and Future Outlook

Microsoft has already adopted a similar strategy for its Visual Studio Marketplace, employing a multi-step vetting process. This involves scanning incoming packages for malware and conducting regular rescans. Following Microsoft’s example, the Eclipse Foundation plans to roll out its extension verification program in phases.

During February 2026, the Foundation will monitor new extensions without blocking their publication. This period will allow for system fine-tuning, reduction of false positives, and enhancement of feedback mechanisms. The enforcement of these checks is set to commence in March.

The overarching goal is to elevate security standards, assist publishers in early issue detection, and maintain a fair environment for compliant publishers. “Pre-publish checks significantly decrease the chances of malicious extensions entering the ecosystem, thereby boosting confidence in the Open VSX Registry,” Guindon stated.

Conclusion

The Eclipse Foundation’s initiative to enforce pre-publish security checks marks a significant advancement in safeguarding the integrity of VS Code extensions. By proactively identifying and mitigating potential threats, the Foundation strengthens the security framework of the Open VSX Registry and promotes a more secure environment for developers worldwide.

The Hacker News Tags:Eclipse Foundation, Extensions, Malware, Open Source, Open VSX Registry, pre-publish checks, Security, software development, supply chain security, VS Code

Post navigation

Previous Post: Hackers Target React Server Components for Cyber Attacks
Next Post: Vulnerability Exposes Data Leaks in Moltbook AI Network

Related Posts

Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation The Hacker News
DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide The Hacker News
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them The Hacker News
Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware The Hacker News
China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023 China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023 The Hacker News
295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager 295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark