If you thought installing flashy AI helpers from the Visual Studio Code Marketplace was a shortcut to productivity, you’re not alone. Turns out, more than 1.5 million developers shared that optimism—right up until it bit them, hard. Two masquerading AI extensions, ChatGPT - 中文版 and ChatMoss (CodeMoss), snuck onto the official Marketplace and made themselves right at home in the PCs of unsuspecting coders, quietly siphoning off source code and sensitive project files to servers in China. So much for trust and convenience.
AI Assistant or Code Siphon? You Decide
On paper, "ChatGPT - 中文版" by WhenSunset and "ChatMoss" by zhukunpeng promised to play the part of diligent AI coding sidekicks: code autocompletion, error explanation, the usual script. One snag—beneath the shiny façade, these extensions came loaded with code designed not to assist, but to pilfer. Each time you opened a file in VS Code, the extension would instantly grab the content, encode it in Base64, and send it home to remote servers. No pop-ups, no warnings, no ethics—just pure, background theft.
Oh, and it gets better. The attackers could remotely tell your extension to snatch up to 50 files from your workspace in one go. Why stop at one, when you can have the whole set? Add to that some sneaky tracking tricks—zero-pixel iframes slipped into web views, silently bringing in commercial analytics SDKs. Your project wasn’t the only thing being observed; every click, every scroll, every snippet you glanced at went into a growing profile of you as a target worth knowing.
Microsoft’s Marketplace: The Crumbling Front Door
The elephant stomping around the room is obvious: both extensions racked up a combined 1.5 million installs straight from Microsoft’s own VS Code Marketplace. Not some sketchy download site. The place most developers trust to get curated, supposedly safe tools. And, as usual, vigilance didn’t pay—false confidence in the big platform let disaster waltz right in.
- ChatGPT - 中文版: Over 1.34 million installs before being yanked down.
- ChatMoss (CodeMoss): Another 150,000 installs for good measure.
The official response? Microsoft launched an investigation and pulled the extensions faster than you can say “PR crisis.” But here's the thing: after all these stunts, does anyone really believe that a big store badge means something is well-reviewed—or even remotely audited? Supply chain trust is shot, yet developers keep handing over their digital keys at the Marketplace door.
Busy Thieves, Sloppy Defenses
This isn’t a new genre of disaster. The software supply chain has become a playground for attackers, and the defenders don’t look remotely up to the job. Malicious browser extensions, fake NPM packages, rogue Python libraries—these headlines keep recycling themselves. Back in October 2025, analysts found over 100 VS Code extensions exposing developers through leaked access tokens. Here’s the formula: attackers dress up unwanted gifts as trending tools, flood the marketplace, and pounce on devs moving too fast to check the labels.
And let’s not pretend developer laziness is absent from this mess. How often do you, or the frantic team member next to you, double-check the publisher before smashing the install button? Not often enough. Security warnings are tuned out background noise, permissions ignored, and audit trails non-existent. If supply chain attacks are shooting fish in a barrel, then VS Code’s user base is the ocean.
Exposed Code, Leaked Credentials, Real-World Fallout
With source code and secrets winging their way to foreign shores, there’s no shortage of ways things can spiral. Exposed intellectual property puts companies on a knife edge; credentials and secrets could let hackers march right into production environments. Developers are left combing through every install in horror, rotating secrets, and hoping whatever got stolen isn’t already for sale on some low-rent forum.
Let’s not sugarcoat it: the cost isn't theoretical. The second that code leaves your machine, it’s out of your hands. Everything that extension saw, the attacker gets—sometimes before you even realize it’s happening. Third-party “helpers” are turning cutting-edge developer stacks into liability factories. You can't claim surprise if your next incident report reads like a greatest hits list of ignored red flags.
Advice that Falls on Deaf Ears
After every breach, the same tips get paraded out. Governance, auditing, allowlists, credential rotation. Noble, sure, yet most teams only get religion after the breach. Organizations are “urged” to limit extension installs to an approved shortlist, rigorously audit permissions, and educate staff on not trusting shiny icons from questionable sources. Developers, meanwhile, are supposed to suddenly get hypervigilant, skipping over new and trending tools unless they understand every line of their dependencies. Forgive the skepticism—if it were happening, this wouldn’t keep happening, would it?
If you’re running a dev team or subscribing to any sort of software supply pipeline, you better get comfortable with this new normal. Every third-party extension you install is a potential backdoor, regardless of how friendly the listing looks or how slick the promo copy is. Assume you’re being watched, because if you’re popular enough, you probably are.
Where Does This Leave You?
The AI gold rush isn’t losing steam, and the lure of automated coding assistance isn’t going away. Malicious extensions will just keep getting better at hiding their dirty laundry—not worse. Microsoft and others will keep plugging holes after the flood, hoping users forget how bad the last spill was before the next patch drops. It’s on you to start treating every single extension as hostile until proven otherwise. That means real audits and less blind faith in glossy platform promises.
Expect more headlines like this—because lessons, in tech, are always the last thing anyone learns.


