Malicious extensions can be engineered to bypass verification checks for popular integrated development environments, according to research from OX Security.
First seen on darkreading.com
Jump to article: www.darkreading.com/application-security/ide-extensions-risks-software-supply-chain
![]()

