Skip to content

Integrated Development Environments (IDEs)

Engineer/DeveloperSecurity SpecialistDevOps

Authored by:

matta
matta
The Red Guild | SEAL
Fredrik Svantes
Fredrik Svantes
Ethereum Foundation
Elliot
Elliot
Solidity Labs

Integrated Development Environments (IDEs) are essential tools for developers, but they also need to be secured. Consider implementing the following best practices:

  1. Install plugins and extensions only from trusted sources, and verify each one through multiple independent channels before installing:

    • Confirm the publisher matches the expected organization — typosquats and lookalike publishers are common.
    • Cross-reference the extension's source repository on GitHub; skim recent commits, open issues, and any security advisories.
    • Check install counts and verified-publisher badges, and prefer signed / officially-published releases over sideloaded builds.

    Due diligence on extensions is typically low, which is precisely why threat actors target this vector: a single malicious or compromised extension can exfiltrate source, secrets, and session tokens across every project on the machine. Use restricted mode if you don't fully trust a project.

  2. Keep IDEs and their plugins/extensions up-to-date to protect against vulnerabilities.

  3. Integrate static code analysis tools within the IDE to catch security issues early in the development process.

  4. Configure IDEs to follow the principle of least privilege, limiting access to sensitive information and systems.

  5. Ensure that potential development environments are isolated from production environments.