2026 Futuriom 50: Highlights →Explore

Executive Summary

In June 2025, the Eclipse Foundation, custodians of the Open VSX open-source project, took immediate remedial action after Wiz security researchers reported that authentication tokens had been unintentionally leaked in several Visual Studio Code (VS Code) extensions across official marketplaces. These exposed tokens could have allowed malicious actors to tamper with extensions, inject malicious code, or compromise downstream developer environments. Upon validation, the Eclipse Foundation promptly revoked a limited set of impacted tokens and notified affected extension maintainers, mitigating potential risks before evidence of active exploitation surfaced. This event underscores the inherent risks in software supply chains, particularly in widely-used open-source development tools.

Software supply chain vulnerabilities remain a top concern for enterprises as development workflows increasingly depend on publicly distributed packages and extensions. The growing adoption of open-source ecosystems means that even small credential leaks can impact thousands of users, driving new urgency for continuous monitoring and proactive threat detection.

Why This Matters Now

This incident highlights the ongoing risk presented by embedded secrets in software supply chains, particularly with popular open-source development tools. With attackers continually targeting trusted distribution channels to reach downstream users, immediate identification and revocation of leaked credentials are more vital than ever.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

Exposed tokens in published extensions highlighted the need for stronger controls on secret management, automated credential scanning, and integration of supply chain security requirements aligned with frameworks like NIST 800-53 and PCI DSS.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Network segmentation, granular workload policy enforcement, and egress control at key cloud borders would have constrained or detected unauthorized token use and supply chain abuse. Zero Trust Segmentation and Threat Detection capabilities would reduce attack surface and trigger alerts during unauthorized lateral moves or suspicious outbound traffic.

Initial Compromise

Control: Zero Trust Segmentation

Mitigation: Narrowed access with least privilege reduces token exposure and risk of abuse.

Privilege Escalation

Control: Multicloud Visibility & Control

Mitigation: Centralized monitoring and policy can detect anomalous privilege escalations.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Microsegmentation blocks unauthorized workload-to-workload movement.

Command & Control

Control: Egress Security & Policy Enforcement

Mitigation: Prevents unapproved outbound C2 traffic from developer or build environments.

Exfiltration

Control: Cloud Firewall (ACF)

Mitigation: Stops unauthorized data export and provides full egress flow visibility.

Impact (Mitigations)

Triggers rapid alerts on anomalous publishing or distribution activities.

Impact at a Glance

Affected Business Functions

  • Software Development
  • Extension Management
Operational Disruption

Estimated downtime: N/A

Financial Impact

Estimated loss: N/A

Data Exposure

No evidence of data exposure was found; 81 extensions were proactively deactivated as a precaution.

Recommended Actions

  • Enforce strict Zero Trust Segmentation to restrict where extension tokens and sensitive identities can be consumed in the cloud supply chain pipeline.
  • Deploy Cloud Firewall and Egress Security controls to prevent unauthorized outbound and C2 communications from developer, build, and publishing environments.
  • Enable East-West Traffic Security to block lateral attacker movement between CI/CD, repository, and runtime workloads.
  • Integrate Multicloud Visibility & Threat Detection for rapid alerting on anomalous publishing, privilege escalations, or suspicious code uploads.
  • Continuously audit developer secrets in public code and apply policy-driven runtime controls across Kubernetes and cloud-native services.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image