1 articletagged with “ide-extensions”
Attack surface analysis for IDE extensions: malicious extensions, extension-to-extension communication, telemetry exfiltration, and workspace trust exploitation.