VS Code Configs Expose GitHub Codespaces to Supply Chain Attacks
Want more insights like this?
Orca Security discovered that GitHub Codespaces automatically executes VS Code configuration files when users open repositories or pull requests, creating a pathway for supply chain attacks. Attackers can embed malicious commands in JSON files within the .vscode/ folder that execute without user approval.
The vulnerability allows hackers to steal GitHub tokens, Codespaces secrets, and other sensitive data. In one attack scenario, bad actors could fork public repositories, create malicious pull requests, and when maintainers open them via Codespaces, their GitHub tokens get compromised. This enables attackers to push verified code as legitimate maintainers.
Microsoft told Orca this behavior is intentional, raising concerns about the security implications of automated configuration execution in cloud development environments.
Source: SecurityWeek