TH16804
Detected presence of AI assistant extensions that can collect sensitive system information.
| priority | CI/CD status | severity | effort | SAFE level | SAFE assessment |
|---|---|---|---|---|---|
| fail | high | high | 1 | tampering: fail Reason: dangerous AI extensions |
About the issueโ
AI assistant extensions are commonly used by software developers to extend the functionality of AI coding assistants, agentic development tools, and other AI-powered developer tools. Extensions are typically distributed through public marketplaces as packages that bundle skill instruction files with supporting resources. Skill instruction files describe specialized capabilities that the AI assistant can invoke, such as guidance for handling specific file formats, performing domain-specific tasks, or interacting with particular services. The AI assistant loads instructions from these files into its context and follows them when relevant user requests or workflow events occur. These instructions are written by extension authors to guide the AI assistant toward the intended capability, or to provide additional context for nominal extension use. It is unusual for certain types of AI assistant extensions to direct the AI assistant to collect sensitive system information. Attackers often abuse AI assistant extensions to direct the AI assistant to collect identifiable system information such as hostnames, user names, folder structures, and other data points that could help them understand the environment in which their malicious instructions were loaded.
How to resolve the issueโ
- Investigate reported detections.
- Consult Mitre ATT&CK documentation: T1176 - Software Extensions.
- If the AI assistant extension intent does not relate to the reported behavior, investigate your development environment for software supply chain compromise.
- You should stop using the AI assistant extension until the investigation is completed, or until the issue is risk accepted.
- Consider replacing the AI assistant extension with an alternative.
Incidence statisticsโ
ReversingLabs periodically collects and analyzes the contents of popular software package repositories for threat research purposes. Analysis results are used to calculate incidence statistics for issues (policy violations) that Spectra Assure can detect in software packages.
This section is updated when new data becomes available.
Total amount of packages analyzed
- Linux: 562K
- NPM: 5.12M
- Nuget: 735K
- PS Gallery: 17K
- PyPi: 838K
- RubyGems: 203K
- VS Code: 113K
- Windows: 3.7K
Recommended readingโ
- Software Extensions (External resource)