Unverified Publisher
Flags items published by entities that haven’t gone through the publisher verification process of the marketplace. Lack of verification may indicate higher risk, as the publisher’s identity and trustworthiness are unconfirmed.
Flags items published by entities that haven’t gone through the publisher verification process of the marketplace. Lack of verification may indicate higher risk, as the publisher’s identity and trustworthiness are unconfirmed.
Flags items lacking installs on the marketplace, suggesting concerns about the extension's reputation and the publisher's reliability.
Flags publishers lacking installs on the marketplace, suggesting concerns about the publisher's reliability.
AI-powered analysis of the extension's source code for security insights and risk assessment.
This Javascript code implements a VS Code extension that relays text document changes over WebSockets. Here's a breakdown:
Core Functionality:
server.js).vscode-languageclient library to synchronize text document changes between VS Code and the server.How it Works:
Activation (activate function):
LanguageClient instance to manage the WebSocket connection and communication with the server.Handling Open/Close Events:
updateOpenFiles function is triggered.wtr/update-open-files) to the server with the updated list of open files.Server-Controlled Synchronization:
wtr/update-active-files) to the extension with a list of "active" files.updateRegistrations function.Updating Synchronized Files (updateRegistrations function):
LanguageClient's registrations to only synchronize changes for the specified "active" files.textDocument/didChange feature.Deactivation (deactivate function):
LanguageClient to close the WebSocket connection when the extension is deactivated.In essence: This extension acts as a bridge, allowing a server to selectively receive and potentially modify real-time text edits made in VS Code. The server controls which files are synchronized and can implement custom logic based on the received changes.
API calls detected through static analysis of the source code. For more accurate insights, explore our sandbox dynamic analysis.
Any encoded/decoded secrets we managed to find in the source code, git repository, or related files
Known vulnerabilities and security issues detected in the extension's dependencies and code.
Any identifiers we detected that may indicate external communication from the item's code
Dependencies and third-party libraries used by the extension, including version information and license details.