Device Attributes Read Access
Flags items that access device attributes such as CPU, MAC address, or OS version.
Flags items that access device attributes such as CPU, MAC address, or OS version.
Flags items that access and read files from the filesystem.
Flags items that create, modify, or delete files in the filesystem.
AI-powered analysis of the extension's source code for security insights and risk assessment.
This extension provides code-editing features for the Apex programming language in Visual Studio Code. Its main intention is to enhance developer productivity for Salesforce Apex development.
Key Features and Activities:
fs and path modules for these operations.No Strong Indicators of Malicious Activity:
Example of process execution (expected for CLI integration):
let t=YV(this.command.command,this.command.args,this.options);
return new mg(this.command,t,e);
This spawns a Salesforce CLI process and streams its output.
Example of telemetry (with opt-out):
this.userOptIn=t.get(Uo.TELEMETRY_CONFIG_ENABLED_ID,!0),this.userOptIn?this.createAppInsightsClient(e):this.dispose()
This respects the user's telemetry settings.
API calls detected through static analysis of the source code. For more accurate insights, explore our sandbox dynamic analysis.
Any encoded/decoded secrets we managed to find in the source code, git repository, or related files
Known vulnerabilities and security issues detected in the extension's dependencies and code.
Any identifiers we detected that may indicate external communication from the item's code
Dependencies and third-party libraries used by the extension, including version information and license details.
Compliance status and certifications for the extension and its publisher