Skip to content

Conversation

lwsinclair
Copy link

Hi there,

This pull request shares a security update on vscode-terraform.

We also have an entry for vscode-terraform in our directory, MseeP.ai, where we provide regular security and trust updates on your app.

We invite you to add our badge for your MCP server to your README to help your users learn from a third party that provides ongoing validation of vscode-terraform.

You can easily take control over your listing for free: visit it at https://mseep.ai/app/hashicorp-vscode-terraform.

Yours Sincerely,

Lawrence W. Sinclair
CEO/SkyDeck AI
Founder of MseeP.ai
MCP servers you can trust


MseeP.ai Security Assessment Badge

Here are our latest evaluation results of vscode-terraform

Security Scan Results

Security Score: 79/100

Risk Level: moderate

Scan Date: 2025-09-11

Score starts at 100, deducts points for security issues, and adds points for security best practices

Detected Vulnerabilities

Medium Severity

  • @eslint/plugin-kit

    • [{'source': 1106734, 'name': '@eslint/plugin-kit', 'dependency': '@eslint/plugin-kit', 'title': '@eslint/plugin-kit is vulnerable to Regular Expression Denial of Service attacks through ConfigCommentParser', 'url': 'https://github.com/advisories/GHSA-xffm-g5w8-qvg7', 'severity': 'low', 'cwe': ['CWE-1333'], 'cvss': {'score': 0, 'vectorString': None}, 'range': '<0.3.4'}]
    • Fixed in version: unknown
  • brace-expansion

    • [{'source': 1105443, 'name': 'brace-expansion', 'dependency': 'brace-expansion', 'title': 'brace-expansion Regular Expression Denial of Service vulnerability', 'url': 'https://github.com/advisories/GHSA-v6h2-p8h4-qcjw', 'severity': 'low', 'cwe': ['CWE-400'], 'cvss': {'score': 3.1, 'vectorString': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}, 'range': '>=1.0.0 <=1.1.11'}, {'source': 1105444, 'name': 'brace-expansion', 'dependency': 'brace-expansion', 'title': 'brace-expansion Regular Expression Denial of Service vulnerability', 'url': 'https://github.com/advisories/GHSA-v6h2-p8h4-qcjw', 'severity': 'low', 'cwe': ['CWE-400'], 'cvss': {'score': 3.1, 'vectorString': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}, 'range': '>=2.0.0 <=2.0.1'}]
    • Fixed in version: unknown
  • koa

    • [{'source': 1106834, 'name': 'koa', 'dependency': 'koa', 'title': 'Koa Open Redirect via Referrer Header (User-Controlled)', 'url': 'https://github.com/advisories/GHSA-jgmv-j7ww-jx2x', 'severity': 'low', 'cwe': ['CWE-601'], 'cvss': {'score': 3.5, 'vectorString': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}, 'range': '>=3.0.0-alpha.0 <3.0.1'}]
    • Fixed in version: unknown
  • ... and 6 more medium severity vulnerabilities

This security assessment was conducted by MseeP.ai, an independent security validation service for MCP servers. Visit our website to learn more about our security reviews.

@lwsinclair lwsinclair requested a review from a team as a code owner September 11, 2025 07:03
Copy link

CLA assistant check

Thank you for your submission! We require that all contributors sign our Contributor License Agreement ("CLA") before we can accept the contribution. Read and sign the agreement

Learn more about why HashiCorp requires a CLA and what the CLA includes

Have you signed the CLA already but the status is still pending? Recheck it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant