Impact
A malicious user can craft input that deceives the SakaDev extension’s language model into labeling a destructive command as safe. The extension then automatically runs the command without asking for user approval, allowing the attacker to execute any arbitrary command on the host machine. The flaw therefore enables full control over the local environment.
Affected Systems
Any installation of the SakaDev Visual Studio Code extension (rahmanazhar.saka-dev) on a user workstation or shared development environment is affected; no specific version information is supplied.
Risk and Exploitability
No CVSS or EPSS scores are available, and the vulnerability is not listed in the CISA KEV catalog, yet the flaw can be exploited whenever a user interacts with the extension’s prompt. Attackers who can supply a crafted prompt—such as through a compromised workspace or social engineering—can trigger automatic execution of malicious commands. The potential impact is significant, though the precise likelihood depends on how readily the attacker can inject the prompt.
OpenCVE Enrichment