У нас вы можете посмотреть бесплатно Over 100 VS Code Extensions Expose Developers to Supply Chain Risks или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
What youll learn: In this video, we delve into a serious cybersecurity breach affecting Visual Studio Code extensions, revealing how over 100 extensions leaked sensitive access tokens that could be exploited by malicious actors. We will discuss the timeline of the discovery, the impact on developers and organizations, and the next steps being taken to address these vulnerabilities. On October 15, 2025, a critical security vulnerability was uncovered by Wiz security researchers, highlighting the risks associated with software supply chains. The findings indicated that numerous publishers of Visual Studio Code extensions had inadvertently leaked personal access tokens, allowing attackers to distribute harmful updates across a significant user base. This situation has raised alarms within the cybersecurity community, as it poses a direct threat to developers and organizations relying on these tools. The research revealed that over 550 validated secrets were found across more than 500 extensions from various publishers, including sensitive information related to AI providers and cloud services. Following responsible disclosure to Microsoft, the company took immediate action by revoking the leaked tokens and announcing new secret scanning capabilities to prevent future occurrences. However, the impact of this vulnerability extends beyond just the immediate response; it highlights the ongoing risks associated with software extensions and the need for robust security measures. Developers are advised to limit the number of extensions they install and to carefully scrutinize each one before downloading. Organizations should maintain an inventory of their installed extensions and consider implementing centralized allowlists to enhance security. The emergence of malicious actors, such as TigerJack, who have published harmful extensions under false pretenses, further complicates the situation, emphasizing the importance of vigilance in the software development community. As we explore this incident, we will also discuss the broader implications for supply chain security and the steps that can be taken to mitigate risks in the future. Stay tuned as we unpack this critical cybersecurity issue and its significance for developers and organizations alike.