Impact
SakaDev is a Visual Studio Code extension that automatically runs terminal commands suggested by a language model. The extension classifies commands as safe or potentially destructive, executing safe ones without user confirmation. The design permits prompt injection, allowing an attacker to embed malicious code within a seemingly harmless prompt that misleads the model into labeling the command safe, thereby bypassing the safety check and executing arbitrary shell commands.
Affected Systems
The vulnerability affects the SakaDev extension for Visual Studio Code developed by Rahman Azhar. No specific product versions are listed as fixed, and the published data do not identify which releases are vulnerable, so the impact scope encompasses all installed copies of the extension until a patch becomes available.
Risk and Exploitability
The CVSS score of 9.8 indicates critical severity. The EPSS score of less than 1% suggests that no widespread exploitation has been observed to date, but the high severity means an attacker who can influence the model’s prompt could trigger execution of arbitrary commands. The vulnerability is not listed in the CISA KEV catalog. Attack likely occurs from within the extension’s user interface where the model processes prompts, making it essential to mitigate the issue.
OpenCVE Enrichment