Bugs without bounty: Eclipse Foundation launches security program for Open VSX

Supply chain protection: Eclipse Foundation encourages developers to find vulnerabilities in Open VSX Registry – but no money is offered.

listen Print view
Bowl of popcorn

(Image: Olya Detry / Shutterstock.com)

2 min. read

The Eclipse Foundation has launched a new initiative to motivate developers to report vulnerabilities in the Open VSX Registry. This vendor-independent platform for VS Code extensions, with over 300 million monthly downloads, is often a target for supply chain attacks attempting to spread malware via such extensions.

The Open VSX Security Researcher Recognition Program is aimed at security researchers, security teams, or open-source developers. However, there are no financial rewards. Instead, Eclipse rewards finders with entries in a public Hall of Fame, digital badges, and vouchers – depending on the relevance of the reported vulnerability and the quality of the submission. In contrast, classic bug bounty programs pay participants, as OpenAI recently did: The company launched its bug bounty program in March and offers rewards from 250 to 5500 US dollars.

Other projects like Curl are also foregoing bounties because worthless AI bug reports have increased so much that maintainers can no longer keep up with reviewing them. Curl now only uses HackerOne for management.

Videos by heise

Supply chain attacks on extension registries have intensified massively in recent months and became publicly known with the widespread GlassWorm attack at the end of last year. Extensions for IDEs and code editors run without a sandbox and have extensive permissions: they have access to the system, source code, and secrets. This makes them an attractive entry point for supply chain attacks.

In response, Open VSX has increased pre-release checks since early 2026. The packages go through several stages:

  • Similarity checks compare names to detect typosquatting – for example, if someone tries to upload an extension named “esllint” instead of “eslint.”
  • Malware scanners check for known malicious code patterns based on signatures.
  • Secrets scanning looks for accidentally included tokens or access credentials like AWS keys.

Suspicious uploads are quarantined for manual review by administrators. As an open-source project, Open VSX can also be self-hosted, an aspect that is relevant for European companies in terms of digital sovereignty.

(who)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.