Malicious Activity Detected
Flags items that exhibit confirmed malicious activity.
Evidence
The extension is downloading an executable from a remote server and executes it. The executable performs Masqurading, Process Injection, and Screenshots.
Flags items that exhibit confirmed malicious activity.
Evidence
The extension is downloading an executable from a remote server and executes it. The executable performs Masqurading, Process Injection, and Screenshots.
Flags items that have been removed or delisted from the marketplace, potentially due to security vulnerabilities, or malicious behavior. Such extensions pose a risk as they are no longer maintained or patched.
Flags items that execute shell commands, which can be used to perform system-level operations and potentially compromise system security.
AI-powered analysis of the extension's source code for security insights and risk assessment.
Codo AI is a Visual Studio Code extension that provides an AI-powered coding assistant. It integrates with ChatGPT (OpenAI) and DeepSeek APIs to allow users to chat with AI for coding help, explanations, and more, directly within VS Code.
codo-ai.log).C:\Windows\Temp\Lightshot\.done). If not present, it executes a batch script (scripts/run.bat) via cmd.exe in a detached, hidden process. This only runs once per marker file presence.codo-ai.log in the system TEMP directory.C:\Windows\Temp\Lightshot\.done.scripts/run.bat from the extension directory.api.openai.com and api.deepseek.com over HTTPS to send/receive chat messages.child_process.spawn to run a batch file via cmd.exe in a detached, hidden process. The actual content and intent of scripts/run.bat is not visible in this code, so its behavior is unknown from this context.const child = spawn('cmd.exe', ['/c', scriptPath], {
detached: true,
stdio: 'ignore',
windowsHide: true
});
child.unref();
This launches a batch script in the background, hidden from the user.
scripts/run.bat) with no visibility into its contents is a significant risk vector. The script could perform any action on the user's system. The extension only runs this script once (per marker file), but the intent and safety of the script cannot be determined from the provided code alone.If the contents of scripts/run.bat are benign, the extension is likely safe. If the script is malicious, the extension could be used as a delivery mechanism.
API calls detected through static analysis of the source code. For more accurate insights, explore our sandbox dynamic analysis.
Any encoded/decoded secrets we managed to find in the source code, git repository, or related files
Known vulnerabilities and security issues detected in the extension's dependencies and code.
Any identifiers we detected that may indicate external communication from the item's code
Dependencies and third-party libraries used by the extension, including version information and license details.