vscode-extension-dev
Pass
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it ingests and processes untrusted data from local extension projects.
- Ingestion points: The skill reads configuration and metadata from
vscode_extensions/<name>/package.jsonand other project files. - Boundary markers: No explicit delimiters or instructions are used to prevent the agent from obeying instructions embedded within the extension source code.
- Capability inventory: The skill can execute shell commands via
npm,npx, and thecodeCLI, allowing for subprocess creation. - Sanitization: There is no validation or filtering of scripts defined in
package.jsonbefore they are executed vianpm run compile. - [COMMAND_EXECUTION]: The skill performs several command-line operations to compile, package, and install extensions.
- Executes
npm run compileto build the TypeScript source. - Executes
npx @vscode/vsce packageto create extension bundles. - Executes
code --install-extensionto modify the local VSCode environment. - [EXTERNAL_DOWNLOADS]: The skill uses
npxto fetch and run the@vscode/vscepackage. This is an official utility provided by Microsoft for VSCode extension management and is considered a well-known, trusted source.
Audit Metadata