Skip to content
| Marketplace
Sign in
Visual Studio Code>Linters>vs-CodeShieldNew to Visual Studio Code? Get it now.
vs-CodeShield

vs-CodeShield

vscodecodeshield

|
14 installs
| (0) | Free
A VS Code extension that detects security vulnerabilities like SQL injection and exposed API keys, providing fix suggestions
Installation
Launch VS Code Quick Open (Ctrl+P), paste the following command, and press enter.
Copied to clipboard
More Info

CodeShield 🛡️

Automatically detect security vulnerabilities in your code with intelligent fix suggestions.

Features

CodeShield provides comprehensive security analysis for multiple programming languages with real-time vulnerability detection and automated fix suggestions.

🔍 Security Vulnerability Detection

  • SQL Injection - Detects unsafe database queries and string concatenation
  • Cross-Site Scripting (XSS) - Identifies script injection vulnerabilities
  • Command Injection - Finds OS command execution risks
  • Path Traversal - Catches directory traversal attacks
  • API Key Exposure - Locates hardcoded secrets and tokens
  • Unsafe Deserialization - Spots object injection risks
  • Buffer Overflow - Identifies memory boundary violations (C++)
  • And 8+ more vulnerability types

🛠️ Smart Code Fixes

  • One-click security improvements via VS Code's Quick Fix (💡)
  • Parameterized query suggestions for SQL injection
  • Environment variable recommendations for secrets
  • Safe alternative function suggestions
  • Detailed explanations for each vulnerability type
  • Ignore functionality for false positives (❌ Ignore button)

🌐 Multi-Language Support

Supports 8 programming languages with language-specific vulnerability patterns

Language Vulnerabilities Detected
JavaScript/TypeScript SQL Injection, XSS, Command Injection, Path Traversal, API Keys, SSRF, Prototype Pollution, ReDoS
Python SQL Injection, Command Injection, Path Traversal, Pickle Deserialization, Template Injection, Unsafe Imports
Java SQL Injection, Command Injection, Path Traversal, Unsafe Deserialization, LDAP Injection, XXE
C# SQL Injection, XSS, Command Injection, Path Traversal, Unsafe Deserialization
C++ Buffer Overflow, Format String, Memory Issues, Command Injection, SQL Injection
PHP SQL Injection, XSS, Command Injection, File Inclusion, Path Traversal, Unsafe Deserialization
Go SQL Injection, Command Injection, Path Traversal, API Key Exposure, Memory Safety
Dart/Flutter Debug Info Leaks, Insecure HTTP, Hardcoded API Keys, Path Traversal, Firebase Config Exposure

Getting Started

Installation

  1. Open VS Code
  2. Go to Extensions (Ctrl+Shift+X / Cmd+Shift+X)
  3. Search for "CodeShield"
  4. Click Install

Usage

  1. Open any supported code file - CodeShield activates automatically
  2. View security issues - Vulnerabilities appear as colored wavy underlines
  3. Save your file (Cmd+S) - 🆕 Automatic notification appears for critical issues
  4. Click "View All" - 🆕 Opens interactive dashboard showing all vulnerabilities
  5. Click any issue - 🆕 Instantly navigates to the vulnerable code location
  6. Get details - Hover over highlighted code for explanations
  7. Apply fixes - Click the 💡 light bulb for quick fixes
  8. Ignore warnings - Use ❌ Ignore button to hide specific vulnerabilities
  9. Manual scan - Use Command Palette (Ctrl+Shift+P) → "CodeShield: Scan Current File for Security Issues"
  10. 🆕 Analyze code snippets - Select any code block → Right-click → "Analyze Selected Code for Security Issues"

What's New in v0.0.11

✨ New Features

🎯 Interactive Vulnerability Dashboard

Beautiful, clickable interface for managing security issues:

  • Auto-appears on save: When critical vulnerabilities are detected, you'll see a notification
  • Click "View All": Opens a professional side-panel with all critical issues
  • Visual organization: Color-coded badges, clear line numbers, and code snippets
  • One-click navigation: Click any vulnerability to jump directly to its location
  • Smart filtering: Shows only critical (error-level) issues to reduce noise
  • Clean UI: Hover effects, smooth transitions, and organized layout

How it works:

  1. Save a file with security issues (Cmd+S)
  2. See notification: "🔴 Found X critical security issue(s)"
  3. Click "View All" button
  4. Interactive panel opens showing all issues
  5. Click any issue to navigate to the exact code location

🔍 Code Snippet Risk Analyzer

Quick security analysis for selected code:

  • No new windows: Results appear in current editor
  • Select and scan: Highlight code → Right-click → "Analyze Selected Code"
  • Instant results: Shows vulnerability count and details
  • Quick navigation: "View Details" button jumps to first issue
  • Perfect for code reviews: Check security without full file scans

📈 Massively Expanded Detection Patterns

All vulnerability detectors have been significantly enhanced:

  • Java: +15 patterns (SSRF, Reflection abuse, XXE, LDAP injection)
  • C#: +20 patterns (LDAP, XXE, SSRF, improved deserialization)
  • C++: +12 patterns (Integer overflow, Race conditions, TOCTOU)
  • PHP: +15 patterns (File upload, Open redirect, XXE)
  • Python: Enhanced subprocess, builtins, input validation detection
  • Go: Complete new pattern set for all major vulnerabilities
  • ReDoS: 6 additional dangerous regex patterns

Examples

SQL Injection Detection

// ❌ Vulnerable - String concatenation in SQL query
query = "SELECT * FROM users WHERE id = " + userId;

// ✅ Secure - Use parameterized queries
const stmt = db.prepare("SELECT * FROM users WHERE id = ?");
const result = stmt.get(userId);

XSS Prevention

// ❌ Vulnerable - DOM innerHTML with user input
element.innerHTML = userContent + "<div>";

// ✅ Secure - Use textContent or sanitize
element.textContent = userContent;

API Key Security

// ❌ Vulnerable - Hardcoded OpenAI API key
const apiKey = "sk-1234567890abcdefghijklmnop";

// ✅ Secure - Environment variable
const apiKey = process.env.OPENAI_API_KEY;

Path Traversal Prevention

// ❌ Vulnerable - File path concatenation
fs.readFile(basePath + userInput, callback);

// ✅ Secure - Path validation and sanitization
const safePath = path.join(basePath, path.basename(userInput));
fs.readFile(safePath, callback);

Unsafe Eval Detection

// ❌ Vulnerable - Dynamic code execution
eval("var result = " + userInput);

// ✅ Secure - Use JSON.parse for data
const result = JSON.parse(userInput);

Extension Commands

You can access these commands via Command Palette (Ctrl+Shift+P / Cmd+Shift+P):

Command Description
CodeShield: Scan Current File for Security Issues Manually scan the active file for vulnerabilities
CodeShield: Scan Workspace for Security Issues Scan all files in the current workspace
CodeShield: Analyze Selected Code for Security Issues 🆕 Analyze only the selected code snippet for vulnerabilities
CodeShield: Explain Security Vulnerability Open detailed explanation for selected vulnerability
CodeShield: Ignore Security Vulnerability Add vulnerability to ignore list

Configuration

CodeShield works out of the box with no configuration required. All scanning happens automatically when you open supported file types.

Optional Settings

CodeShield works great with default settings. Notifications automatically appear for critical issues only.

Note: Automatic notifications are enabled by default and show only critical (error-level) vulnerabilities when you save files. This helps you stay aware of serious security issues without overwhelming you with alerts.

Requirements

  • Visual Studio Code version 1.74.0 or higher
  • No additional software or dependencies required

Supported File Extensions

CodeShield automatically activates for these file types:

  • .js, .jsx (JavaScript)
  • .ts, .tsx (TypeScript)
  • .py (Python)
  • .java (Java)
  • .cs (C#)
  • .cpp, .c, .h (C/C++)
  • .php (PHP)
  • .go (Go)
  • .dart (Dart/Flutter)
  • .sql (SQL files)

Known Issues

None at this time. If you encounter any issues, please report them on GitHub.

Contributing

We welcome contributions! Please submit issues and pull requests on GitHub.

License

This extension is licensed under the MIT License.


Secure your code with CodeShield 🛡️

  • Contact us
  • Jobs
  • Privacy
  • Manage cookies
  • Terms of use
  • Trademarks
© 2026 Microsoft