Automated Security Framework for VS Code Extensions: Risk Profiling, Policy Generation, and Runtime Sandboxing - NHSJS
nhsjs.com·1d·
Discuss: Hacker News
🏺Code Archeology
Preview
Report Post

Abstract

Visual Studio Code (VS Code) extensions enhance productivity but pose serious security risks by inheriting full IDE privileges, including access to the file system, network, and system processes. We present the first automated solution that profiles, sandboxes, and enforces least-privilege execution policies for VS Code extensions at runtime. The system begins with a multi-layered static risk assessment that combines metadata inspection, supply chain auditing, AST-based code analysis, and LLM inference to identify sensitive behaviors and assign a risk category: reject, unrestricted, or sandbox. For sandboxed extensions, it generates fine-grained policies by mapping required Node.js APIs and dynamically constructed resources such as paths, endpoints, and shell commands. …

Similar Posts

Loading similar posts...