tuckner
banner
johntuckner.me
tuckner
@johntuckner.me
Working on finding bad software extensions. More at: https://annex.security
LimaCharlie released their Agentic SecOps Workspace recently which runs Claude Code in their UI including MCP servers. It's never been so easy to just say 'look at my detections and research the extensions'. Even though 1Password falls under an unapproved policy, at least it isn't malicious!
February 4, 2026 at 9:16 PM
As predicted - "oorzc" a developer with extensions totalling 25,000 legitimate installs across 4 extensions looks to have had their Open VSX account compromised and published malicious updates. The worst part is this...
The next supply chain worm has been seeded in Open VSX. A cloned Angular extension with 5000 downloads has been available for two weeks and was updated with malware 6 days ago. This multi stage attack uses etherhiding, gcal c2, rust implants, and more.

annex.security/blog/worms-l...
Worms lurking in code extensions
Worms are hiding discreetly in extension marketplaces waiting to trigger the next mass scale event.
annex.security
January 31, 2026 at 6:28 PM
The next supply chain worm has been seeded in Open VSX. A cloned Angular extension with 5000 downloads has been available for two weeks and was updated with malware 6 days ago. This multi stage attack uses etherhiding, gcal c2, rust implants, and more.

annex.security/blog/worms-l...
Worms lurking in code extensions
Worms are hiding discreetly in extension marketplaces waiting to trigger the next mass scale event.
annex.security
January 28, 2026 at 10:04 PM
Obsidian Security identifies a set of 25 extensions impersonating popular AI providers affecting over 500,000 real users by stealing API keys, prompt poaching, and capturing search queries. It's the wild west in the extension store!

www.obsidiansecurity.com/blog/small-t...
Small Tools, Big Risk: When Browser Extensions Start Stealing API Keys
www.obsidiansecurity.com
January 28, 2026 at 12:38 AM
If you've had to listen to me over the last couple months, it's likely you would've hear me say that all of our most important apps will have extensions or plugins for integration. Think we're learning from past mistakes?
January 19, 2026 at 3:02 PM
A browser extension, PasteReady, was listed for sale last May became malicious after an ownership transfer on December 27th. Many organizations have been impacted by extensions which changed hands. @secureannex.com watches for transfers and warns you in advance!

www.linkedin.com/pulse/paster...
PasteReady: Danger of sold extensions
The PasteReady browser extension (dcbikjphkkgmgmjoohmbnhccbndgpmin) was sold and the new owner pushed malware immediately after taking ownership. PasteReady was put up for sale on http://extensionhub.
www.linkedin.com
January 16, 2026 at 4:25 PM
Pyrefly - Python Language Tooling by Meta is the 4th most used extension in Open VSX. Be careful downloading the 'Pro' version in Cursor hoping you'll get some extra features, it is published by 'casendsabotnu954' who just joined GitHub the other day. Textbook cloning and staging behavior!
January 14, 2026 at 9:10 PM
Loving a new detection that identifies code extensions published by new and lightly used GitHub accounts.This time it instantly caught an extension impersonating JFrog which already has over 10k downloads.
January 8, 2026 at 4:57 PM
Not the "pulling a Rabbit out of a hat" magic trick that most want. This Firefox extension completely changes from a "Simple Label Editor" to a Rabby wallet stealer overnight.
January 5, 2026 at 7:35 PM
A browser extension with over a million users is poaching the prompts of leading AI chat tools.

SimilarWeb loads obfuscated remote configuration to collect the prompts, responses and metadata of your conversations. Your private thoughts are analytics companies gain.

secureannex.com/blog/prompt-...
Prompt poaching runs rampant in extensions
Web analytics companies are using browser extensions to monetize your most private thoughts
secureannex.com
December 29, 2025 at 4:08 PM
These code comments are an improvement from:

1. Request malware
2. Download malware
3. Make malware executable
4. Run malware

This is the extent of the extension available in the VS Marketplace. Installs a Mythic agent from the C2.
December 17, 2025 at 3:18 PM
Monitoring a large influx of AI slop extensions that are reposting a marginally refactored but known malicious package. The marketplace listings are packed with emojis and a couple sections of 'features'. This one made the mistake of linking to an already known piece of malware.
December 10, 2025 at 8:15 PM
Welcome to Antigravity the newest most advanced agentic AI development tool by Google...

... uses Open VSX for extensions and shows malicious listings to users.
December 9, 2025 at 4:51 PM
Changing how an extension looks in a marketplace doesn't require new code to be pushed. Check out the magic when this "Test Extension" magically turns into a "solidity" extension after being published. Review the full lineage of a marketplace listing using the new date picker in Secure Annex.
December 5, 2025 at 3:01 PM
Vibed coded malicious extensions are getting out of hand!

This 'theme' downloads a malicious zip, unpacks it, and runs it silently with PowerShell.
December 5, 2025 at 12:17 AM
16 Firefox extensions with the almost the same name, same permhash requesting the most sensitive permission combinations like <all_urls> and cookies. Something being staged?
December 2, 2025 at 4:01 PM
Glassworm returned in a big way during the holiday. We're tracking 23 code extensions across the VS Marketplace and Open VSX which copy popular extensions, evade filters, manipulate their download counts, and then update with sinister malware.

secureannex.com/blog/glasswo...
Glassworm stays prevalent
Glassworm attacks look to take full advantage of the holidays
secureannex.com
December 1, 2025 at 5:22 AM
Malware in Open VSX and available in Cursor right now

tailwind-nuxt.tailwindcss-for-react
flutcode.flutter-extension
yamlcode.yaml-vscode-extension
December 1, 2025 at 4:02 AM
Unprecedented code extension attacks this week. All are name squatting on popular tools. Only a couple have had malware deployed, many are still staging, few have been removed from marketplaces. There may be more coming.

VS Marketplace:
iconkieftwo.icon-theme-materiall

1/3
November 28, 2025 at 4:28 PM
Imagine how useful it would be if the Chrome Web Store showed you users over time. This ad blocker went from 0 to 40,000 users overnight! 🤔
November 24, 2025 at 2:38 PM
Going to have to reread Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson in order to keep up with the advanced tactics we're starting to see in VS Code extension malware.
November 20, 2025 at 3:30 PM
Really excited to being supporting crxaminer.tech with some Secure Annex details. Looking forward to more opportunities to get more information on browser extensions out there!
November 19, 2025 at 3:15 PM
Mackenzie Jackson is raising a red flag about the risks IDE extensions present. Always on top of the top industry trends. Thanks for letting me share a bit!

m.youtube.com/watch?v=FiJ_...
- YouTube
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
www.youtube.com
November 18, 2025 at 4:44 PM
The extension was approved, now what? Are you going back tomorrow to see if it changed? You know they auto update instantly right? Rolling out to Secure Annex - code change alerts.

This compares past code with additional context to understand how an extension is changing over time. Catch bad quick!
November 17, 2025 at 6:30 PM
A brand new unlisted extension with 100,000 users? 41 ratings? Must be really valuable.

Nope - completely manipulated stats and it doesn't even contain real code. It exists only to collect your searches and earn Bing Rewards.
November 14, 2025 at 5:14 PM