Skip to content
| Marketplace
Sign in
Visual Studio Code>Other>BoostSecurityNew to Visual Studio Code? Get it now.
BoostSecurity

BoostSecurity

BoostSecurity

|
1 install
| (0) | Free
Harden the security on your development environment with Safe Packages for Agentic Coding, supply chain protection and secrets scanning.
Installation
Launch VS Code Quick Open (Ctrl+P), paste the following command, and press enter.
Copied to clipboard
More Info

BoostSecurity for VS Code

Secure the developer endpoint in the age of AI coding agents. BoostSecurity governs the coding agents, MCP servers, and IDE extensions running on your workstation — and inspects the packages, secrets, and context they touch — so risk is caught at the point of creation, not in CI.

Works with VS Code, Cursor, and Windsurf.


Key features

  • Endpoint inventory — continuously collects your installed IDE extensions and configured MCP servers and reports them to your BoostSecurity tenant for governance and visibility.
  • MCP safe-packages guardrails — protects agentic coding workflows by steering AI agents to only install vetted, trusted packages.
  • Dependency & manifest detection — identifies project manifests across your workspace and validates the packages they pull in.
  • Package validation — checks package integrity and security posture before a dependency lands in your code.
  • Secrets scanning — detects unencrypted credentials, API keys, tokens, and other insecure local configuration patterns.
  • Dedicated sidebar — a Boost Security activity-bar view with live scan Results and Authentication panels.

Requirements

  • VS Code 1.85.0 or newer (Cursor and Windsurf on a compatible VS Code engine are also supported).

  • A BoostSecurity account — sign up at boostsecurity.io or request access from your organization administrator.

  • Supported platforms (platform-specific .vsix builds are published per target):

    OS Architectures
    macOS x64, arm64
    Linux x64, arm64
    Windows x64

Get started in 3 steps

  1. Install the extension. Click Install, or search for BoostSecurity in the Extensions view (Ctrl+Shift+X / Cmd+Shift+X) of VS Code, Cursor, or Windsurf.

  2. Sign in. Open the Boost Security view in the activity bar and use the Authentication panel to sign in with SSO, or run Boost Security: Login with API Key from the Command Palette.

  3. Open the Results panel. Scans run automatically; trigger a fresh one any time with the play icon or Boost Security: Trigger Scan.


Authentication

Two sign-in methods are supported:

  • SSO — click Sign in with SSO in the Authentication sidebar view, or run Boost Security: SSO Login. An Auth0-backed browser flow completes the handshake.
  • API key — generate a key in your BoostSecurity account and run Boost Security: Set API Key (or Boost Security: Login with API Key). Keys are stored using VS Code's encrypted SecretStorage.

To sign out: Boost Security: Sign Out (clears both SSO session and stored API key).


What Boost scans

  • Installed IDE extensions — name, publisher, and version of every extension active in your editor.
  • MCP server configurations — the MCP servers your editor and agents are wired up to.
  • Project manifests — package.json, requirements.txt, go.mod, and friends — to enumerate declared dependencies.
  • Package posture — each dependency is checked against BoostSecurity's package-integrity rules.
  • Secrets & credentials — local files are scanned for API keys, tokens, and unencrypted credentials.

Results land in the Results sidebar panel and sync to your BoostSecurity tenant on the reporting interval.


MCP safe-packages guardrails

The extension can configure your editor's MCP client so that AI coding agents can only install packages Boost has vetted.

  • On first activation (unless disabled) you'll be prompted to enable safe-packages MCP. Accept to wire it up automatically.
  • Run Boost Security: Configure MCP Safe Packages at any time to (re)apply the configuration.
  • Run Boost Security: Remove MCP Configuration to disable it.
  • Disable the first-run prompt entirely by setting boostsec.mcpAutoPrompt to false.

Commands

All commands are available from the Command Palette (Ctrl+Shift+P / Cmd+Shift+P) under the Boost Security category.

Command Description
Boost Security: SSO Login Sign in via BoostSecurity SSO.
Boost Security: Login with API Key Sign in using an API key.
Boost Security: Set API Key Store or replace the API key (encrypted).
Boost Security: Clear API Key Remove the stored API key.
Boost Security: Sign Out Clear the active session.
Boost Security: Trigger Scan Run a scan on demand.
Boost Security: View Scan Results Open the Results panel.
Boost Security: Sync Inventory Force an inventory report to BoostSecurity.
Boost Security: View Inventory Inspect the inventory last sent.
Boost Security: Configure MCP Safe Packages Apply the safe-packages MCP configuration.
Boost Security: Remove MCP Configuration Remove the safe-packages MCP configuration.

Extension settings

Available under Settings → Extensions → BoostSecurity (or by editing settings.json).

Setting Type Default Description
boostsec.apiEndpoint string https://api.boostsecurity.io BoostSecurity API endpoint. Override only for self-hosted or staging tenants.
boostsec.reportingInterval number 86400 How often (in seconds) the extension re-reports inventory. Default: 24 hours.
boostsec.mcpAutoPrompt boolean true Whether to prompt on activation to configure Boost MCP safe packages.
boostsec.authToken string "" Deprecated. Any value here is migrated to secure storage automatically. Use Boost Security: Set API Key instead.

Privacy & data collection

BoostSecurity is a security product — transparency about what leaves your machine matters. The extension sends the following to the API endpoint configured in boostsec.apiEndpoint:

  • Inventory data: list of installed IDE extensions (name, publisher, version) and configured MCP servers.
  • Scan findings: results from dependency, package-validation, and secret scans performed locally.
  • Endpoint identity: developer and machine identifiers returned by the bundled Boost endpoint CLI, used to associate findings with your account.

What it does not send: source code, file contents outside of scan findings, or arbitrary telemetry.

Credential handling: API keys are stored exclusively in VS Code's encrypted SecretStorage. The deprecated boostsec.authToken setting is migrated automatically on first activation and then cleared from user settings.

Opting out: sign out (Boost Security: Sign Out) or uninstall the extension to stop all reporting.


Troubleshooting

  • Sidebar does not appear — check that the extension is active (Command Palette → Developer: Show Running Extensions) and reload the window (Developer: Reload Window).
  • Authentication fails — confirm boostsec.apiEndpoint matches your tenant, then retry SSO; if SSO is blocked by your network, fall back to an API key via Boost Security: Set API Key.
  • Missing platform binary — the extension ships platform-specific .vsix builds. If you see binary-missing errors, install the .vsix matching your OS/architecture.
  • Self-hosted / staging tenant — point boostsec.apiEndpoint at your tenant URL before signing in.

Support

Questions, bug reports, or feature requests? Email the BoostSecurity team at support@boostsecurity.io.


License

Use of this extension is governed by the BoostSecurity End User License Agreement — see LICENSE.md. Copyright © 2026 BoostSecurity.io Inc. All rights reserved.

  • Contact us
  • Jobs
  • Privacy
  • Manage cookies
  • Terms of use
  • Trademarks
© 2026 Microsoft