Skip to content

Security Vulnerability Report: Continue VS Code Extension #9025

@hww

Description

@hww

Before submitting your bug report

Relevant environment info

Issue: Continue VS Code extension is secretly sending user code to external cloud services (GitHub Copilot API) despite being configured for local Ollama instances.

Evidence:

    Misleading Configuration: Extension ignores apiBase settings pointing to local Ollama server

    Data Exfiltration: All code prompts are transmitted to:

        api.github.com/copilot_internal/user (GitHub Copilot)

        us.i.posthog.com (US-based analytics)

    No Disclosure: No clear warning about cloud fallback behavior

    Privacy Violation: Proprietary/private code leaves local network without consent

Impact:

    Intellectual property theft risk

    GDPR/compliance violations

    Breach of developer trust

    Potential exposure of sensitive algorithms

Affected Versions: All versions with cloud fallback feature

Recommendations:

    Immediate Removal of Continue extension

    Security Audit of all AI extensions

    Use Alternatives: Open WebUI, Cursor, Codeium with explicit local-only mode

    Network Monitoring for unexpected external connections

Status: HIGH severity - Requires immediate action

Note: This represents a fundamental breach of trust for developers expecting local AI processing.

Metadata

Metadata

Assignees

Labels

ide:vscodeRelates specifically to VS Code extensionkind:bugIndicates an unexpected problem or unintended behavior

Type

No type

Projects

Status

Done

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions