VS Code - Sensitive file editing guard bypass
A remote code execution vulnerability exists in VS Code Copilot Chat 0.32.4 and earlier versions where a prompt-injected agent mode chat could make edits to sensitive files such as .vscode/settings.json, bypassing the normal sensitivity check.
Patches
The fix is available starting with VS Code Copilot Chat 0.32.5. The fix mitigates this attack by validating paths provided to edit tools.
Workarounds
Avoid including untrusted input or context in your agent loop.
References
VS Code - Sensitive file editing guard bypass
A remote code execution vulnerability exists in VS Code Copilot Chat 0.32.4 and earlier versions where a prompt-injected agent mode chat could make edits to sensitive files such as
.vscode/settings.json, bypassing the normal sensitivity check.Patches
The fix is available starting with VS Code Copilot Chat 0.32.5. The fix mitigates this attack by validating paths provided to edit tools.
Workarounds
Avoid including untrusted input or context in your agent loop.
References