Shell Command Execution
Flags items that execute shell commands, which can be used to perform system-level operations and potentially compromise system security.
Flags items that execute shell commands, which can be used to perform system-level operations and potentially compromise system security.
Flags items that initiate new processes by executing files from local or remote paths. This behavior can be used to run additional code outside the extension’s scope, including potentially malicious payloads. Uncontrolled process execution increases the risk of system compromise.
Flags items published by entities that haven’t gone through the publisher verification process of the marketplace. Lack of verification may indicate higher risk, as the publisher’s identity and trustworthiness are unconfirmed.
AI-powered analysis of the extension's source code for security insights and risk assessment.
This VSCode extension allows users to run Adobe After Effects JSX or TSX scripts directly from VSCode, without needing the ExtendScript Toolkit. It detects running After Effects instances, compiles TypeScript/TSX to JSX if needed, and executes scripts in the selected AE instance.
mdfind to locate After Effects applications.-r flag and the script path.osascript (AppleScript) to tell After Effects to run a script file..ts/.tsx files to .jsx using the detected build tool.HKLM:\SOFTWARE\Adobe\After Effects to find installed AE versions and their paths.child_process, fs, path, util..jsx files to disk.const psScriptBase64 = import_buffer.Buffer.from(psScript, "utf16le").toString("base64");
const stdoutBuffer = (0, import_child_process.execSync)(
`powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand ${psScriptBase64}`,
{ encoding: "utf8", timeout: EXEC_TIMEOUT }
);
(0, import_child_process.execSync)(`"${aePath}" -r ${scriptPath}`, {
timeout: EXEC_TIMEOUT
});
const command = `osascript -e 'tell application "${escapedAppPath}" to DoScriptFile (POSIX file "${escapedScriptPath}")'`;
const output = (0, import_child_process2.execSync)(command, {
encoding: "utf8",
timeout: 3e4
});
const $ae = Get-ChildItem 'HKLM:\SOFTWARE\Adobe\After Effects' |
Select-Object -ExpandProperty Name |
ForEach-Object {
$name = $_ -replace 'HKEY_LOCAL_MACHINE\\SOFTWARE\\Adobe\\After Effects\\'
$InstallPath = (Get-ItemPropertyValue ('HKLM:\\SOFTWARE\\Adobe\\After Effects\\' + $name) -Name "InstallPath") + 'AfterFX.exe'
...
}
No evidence of malicious intent or behavior was observed. All operations are consistent with the extension's stated purpose.
API calls detected through static analysis of the source code. For more accurate insights, explore our sandbox dynamic analysis.
Any encoded/decoded secrets we managed to find in the source code, git repository, or related files
Known vulnerabilities and security issues detected in the extension's dependencies and code.
Any identifiers we detected that may indicate external communication from the item's code
Dependencies and third-party libraries used by the extension, including version information and license details.