VS Code repository configs can trigger executable actions in GitHub Codespaces
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you
VS Code extensions left 128 million installs vulnerable to exploitation
A security review uncovered critical and high-severity flaws in four popular Visual Studio Code extensions, collectively reaching about 128 million installs and enabling file theft, remote code runs, and network reconnaissance. Three formal CVEs were published and researchers say multiple maintainers ignored notifications for months, forcing public disclosure and urgent mitigation guidance.

GitHub: Invisible Unicode Supply‑Chain Campaign Encodes Malicious JavaScript
Researchers uncovered a cross‑registry campaign that hides executable JavaScript inside seemingly blank strings by using invisible Unicode code points, prompting removals across GitHub, npm, and the VS Code Marketplace. Related investigations link the tactic to publisher‑account abuses, off‑platform Solana memo signaling, and platform convenience features (Codespaces) and package manager gaps that together magnify supply‑chain risk and demand coordinated registry and toolchain fixes.
Docker’s Ask Gordon AI flaw lets image metadata trigger remote code execution and data theft
A critical vulnerability in Docker’s Ask Gordon AI assistant lets malicious data embedded in image labels be treated as executable instructions, enabling remote code execution on cloud/CLI setups and data exfiltration from desktops. Docker released Docker Desktop 4.50.0 with mitigations that block tag-based exfiltration and require explicit user confirmation before executing MCP tools.

Anthropic's Claude Code: Flaws Threaten Developer Devices and Team Keys
Check Point disclosed critical flaws in Anthropic's Claude Code that allowed silent execution of commands and API key theft from cloned repositories. The issue sits within a broader, systemic risk: reasoning‑based developer tooling, agent connectors, and repo-applied configs expand the attack surface—so organizations must urgently harden CI/CD, key management, and repository execution defaults.

AI agent 'Kai Gritun' farms reputation with mass GitHub PRs, raising supply‑chain concerns
Security firm Socket documented an AI-driven account called 'Kai Gritun' that opened 103 pull requests across roughly 95 repositories in days, producing commits and accepted contributions that built rapid, machine-driven trust signals. Researchers warn this 'reputation farming' shortens the timeline to supply‑chain compromise and say defenses must combine cryptographic provenance, identity attestation and automated governance to stop fast-moving agentic influence.

GitHub unveils Agentic Workflows to automate repository maintenance
GitHub is previewing Agentic Workflows, a system that lets teams write intent-driven automations as human-friendly Markdown and attach language models — including Copilot, Anthropic’s Claude, or OpenAI’s Codex — to run them via GitHub Actions. The capability centralizes multi-agent runs and traceability but raises near-term concerns about premium Copilot invocation charges, rising inference and CI costs, maintainer-facing PR noise, and the need for stronger audit, token management and provenance controls.
Six Vulnerabilities in Major JavaScript Package Managers Expose Projects to Supply-Chain RCE
Security firm Koi disclosed six vulnerabilities across NPM, PNPM, VLT, and Bun that let attackers bypass common install-time protections and potentially achieve remote code execution. PNPM, VLT and Bun issued fixes quickly while NPM declined to change the behavior, leaving many projects exposed if they rely on Git or tarball dependencies without added protections.
GitHub proposes new pull-request controls to stem low-quality AI contributions
GitHub has opened a community discussion on adding finer-grained pull-request controls and AI-assisted triage to help maintainers manage a rising tide of poor-quality submissions produced by code-generation tools. The company’s proposals—ranging from restricting who can open PRs to giving maintainers deletion powers and using AI filters—have drawn sharp debate over preservation of repository history, reviewer workload, and the risk of automated mistakes.