Thanks for building a scanner! I wish it wasn't necessary :/
Right now we have the latter.
The difference does matter less when the binary and plugin are produced by the same group or individual though.
I think someone had already mentioned that it would be useful to have this as an extension to scan existing installed extensions but would there be a way to scan just prior to extension installation?
As for the raw name, most extensions should work if you just put the display name. The search algorithm directly pulls from the vscode marketplace.
If you update your UI to accept a "bulk analyze" mode where a list of newline extensions could be submitted and rendered out on a page, that would be pretty cool.
Take for example:
streetsidesoftware.code-spell-checker, 14.5M installs,
Score 81 out of 100.
Major scoring factor is "Contributes functionality via 'terminal'."
It seems to me that this will give wildly inaccurate scores.
Would be interesting to get more details on the sandbox.
it would also be nice if i could expand all the analysis detail at once, instead of just one section at a time.
I restricted it to one expanded at a time since more than one felt a bit crowded but that's something I might look into.
However, I always roll my eyes when I see high severity risk in dependency chains due to ReDoS vulnerabilities. Sure, it matters for a web server maybe, but code running in a CLI tool, browser app, VSCode extension, or even a serverless lambda runtime really won't be affected much. More often than not, I find the `npm audit` risk classifications to be nonsense.