Open VSX Token Tango: Malicious Extensions Unleashed in Comedic Supply Chain Flop
The Open VSX registry had to rotate access tokens after developers accidentally leaked them, allowing threat actors to publish malicious extensions. This led to a campaign dubbed “GlassWorm,” which hid malware in invisible Unicode characters. Thankfully, the Open VSX team acted swiftly, containing the threat faster than a squirrel on espresso.

Hot Take:
It’s as if the Open VSX registry decided to pull an Oprah: “You get a token! You get a token! Everybody gets a token!” Unfortunately, this wasn’t a feel-good episode, but a supply chain drama with more plot twists than a daytime soap! Open VSX, you had one job: keep those tokens secret and safe, not turn them into party favors for hackers!
Key Points:
- Open VSX tokens leaked, allowing threat actors to publish malicious extensions.
- 550 secrets were exposed, leading to a significant supply-chain risk.
- The GlassWorm campaign targeted developer credentials and cryptocurrency wallets.
- The Open VSX registry has since contained the threat and rotated affected tokens.
- Security measures are being enhanced to prevent future attacks.
Already a member? Log in here
