惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

博客园 - 司徒正美
aimingoo的专栏
aimingoo的专栏
MongoDB | Blog
MongoDB | Blog
云风的 BLOG
云风的 BLOG
OSCHINA 社区最新新闻
OSCHINA 社区最新新闻
酷 壳 – CoolShell
酷 壳 – CoolShell
博客园 - 聂微东
Y
Y Combinator Blog
T
Tailwind CSS Blog
奇客Solidot–传递最新科技情报
奇客Solidot–传递最新科技情报
S
SegmentFault 最新的问题
让小产品的独立变现更简单 - ezindie.com
让小产品的独立变现更简单 - ezindie.com
博客园 - 【当耐特】
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
J
Java Code Geeks
美团技术团队
Google DeepMind News
Google DeepMind News
博客园_首页
Apple Machine Learning Research
Apple Machine Learning Research
T
The Blog of Author Tim Ferriss

DEV Community

I Migrated 23 Make.com Scenarios to n8n and Cut My Bill by 60% — Complete Migration Guide (2026) Solving a Logistics Problem Using Genetic Algorithms Claude Code Skills Explained: What They Are & When to Use Them (2026) Maintaining Apache Iceberg Tables: Compaction, Expiry, and Cleanup Zero-Idle Local LLMs: Running Llama 3 in AWS Lambda Containers We scanned 8 B2B SaaS companies across 5 categories. ChatGPT named the same 12 brands in every answer. Unit Testing vs System Testing: Key Differences, Use Cases, and Best Practices for 2026 A game design textbook explains why products with fewer features win How to Build a Raydium Launchpad Bonding Curve in 5 Minutes with forgekit How to turn an AI prototype into a production system How Data Lake Table Storage Degrades Over Time Partition and Sort Keys on DynamoDB: Modeling data for batch-and-stream convergence Auto-Generate Optimized GitHub Actions Workflows For Any Stack With This New CLI Tool Unchaining the African Creator Economy The Treasure Hunt Engine Gotcha - A Lesson in Constrained Performance great_cto v2.17 - no more tambourine dance When Catalogs Are Embedded in Storage SafeMind AI: Instant Health & Safety Intelligence What Is PKCE, How It Works & Flow Examples AI Agent Failure Modes Beyond Hallucination Fastest Way to Understand Stryker Solana Accounts Explained to a Web2 Developer TV Yayın Akışı Sitesi Geliştirirken Öğrendiğim Teknik Dersler $500 Challenge Drop My First Look at Google's Gemma 4: A Quick Introduction How I use an LLM as a translation judge Best Calendar and Scheduling API for Developers — 2026 Comparison Agentic AI in Travel: Why UCP Isn't Travel-Ready Yet — and What We Measured I Finished Machine Learning. And Then Changed The Plan. The Five-Thousand-Line File The AI Whirlwind: Why Your Local Agent Matters More Than Ever I Built an Oracle DBA That Lives in Telegram. It Cut a 500K-Row Scan to 5 - After Asking Permission. The Day 2 Reality of Running a Kubernetes Lab on Your Mac: Stop/Start, CKS Scenarios, and What I Learned Building It. n8n for Airtable Power Users: 5 Automations That Take Your Base to the Next Level Validating Gemma 4 for Industrial IoT: A Governance Pattern VS Code Now Credits Copilot on Every Commit by Default Astro and Islands Architecture: Why Your Portfolio Doesn't Need React for Everything Booting from FAT12: How I added file reading to my x86 kernel Unity’s AI agent went public: the developers of a static analysis tool on what that means for code quality Anna's Archive publica un llms.txt para los LLMs que rastrean su catálogo CRDTs for Offline-First Mobile Sync Why I Built Mneme HQ: Preventing AI Agent Architectural Drift Google Antigravity 2.0 Is the I/O 2026 Announcement You Should Actually Care About I Built a Pay-Per-Call Crypto Signal API with x402 — Heres the Architecture JWT Token Refresh Patterns in React 19: Avoiding the Silent Auth Death Spiral 🚀 “From Prompts to Autonomous Agents: What Google I/O 2026 Changed” The Power of Distributed Consensus in Autonomous SOCs Sixteen TUI components, copy-paste, no dependency The Boring Reliability Layer Every Autonomous Agent Needs Nven - Secret manager Building Multi-Tenant Row-Level Security in PostgreSQL: A Production Pattern The Hardest Part of Being a Developer Isn't Coding Building Vylo — Looking for Collaborators, Partners & Early Support I Thought Memory Fades With Time. It Actually Fades With Information. ORA-00064 오류 원인과 해결 방법 완벽 가이드 I registered an AI agent at 1 AM and something cracked open in my head Pitch: Nven - Sync secrets. Ship faster. Why y=mx+b is the heart of AI From Routines to a Crew — Building a System That Plans Its Own Work & executes it 25 React Interview Questions 2026 (With Answers) — Hooks, React 19, Concurrent Mode An open source LLM eval tool with two independent quality signals Using Dashboard Filtering to Get Customer Usage in Seconds from TBs of Data Skills, Java 17, And Theme Accents 4 Hard Lessons on Optimizing AI Coding Agents Arctype: Cross-Platform Database GUI for LLM Artifacts Your robots.txt says GPTBot is welcome. Your server says 403. Organizing How to Use AWS Glue Workflow 5 n8n Automations Every Digital Agency Should Be Running (Bill More, Work Less) Getting Started with TorchGeo — Remote Sensing with PyTorch Designing a Scalable Cross-Platform Appium Framework Google Antigravity 2.0 & Slash Commands Building a Unified Adaptive Learning Intelligence with Gemma 4, Flutter, and Multi-Model Orchestration Looking for beta testers for a £60 server management application The Disk-Pressure Incident That Taught Me to Always Set LimitRanges and Other Lessons from Mirroring EKS Locally. Why AI Should Not Write SQL Against ERP Databases Vibe coding works until it doesn't. The debt is real. Shipping at the Edge: Migrating a Coffee Subscription Platform to Cloudflare Workers Stop Tab-Switching: A Developer's Guide to Color Tools That Actually Fit the Workflow DevOps vs MLOps vs AIOps: What Changes, What Stays, and a Simple Roadmap to Get Started Run Powerful AI Coding Locally on a Normal Laptop 5 n8n Automations Every WooCommerce Store Needs (Save 10+ Hours/Week) What I Learned Building My Own AI Harness Hytale Servers Will Fail Treasure Hunts Until We Fix Our Event Handling Redux in React: Managing Global State Like a Pro Unfreezing Your GitHub Actions: Troubleshooting Stuck Deployments and Protecting Your Git Repo Statistics Unlocking Project Discoverability on GHES: A Key to Software Engineering Productivity When the Cleanup Code Becomes the Project Rockpack 8.0 - A React Scaffolder Built for the Age of AI-Assisted Development Mismanaging the Treasure Hunt Engine in Hytale Servers Will Get You Killed Stop Calling It an AI Assistant. It’s Already Managing Your Company Why Hardcoded Automations Fail AI Agents Why I built a post-quantum signing API (and why JWT is on borrowed time) Weekend Thought: Frontend Build Tools Suffer From Work Amnesia AI Is Changing Engineering Culture More Than We Realize A 10-Line Playwright Trick That Saved Me Hours on Every Sephora Run Everyone Was Focused on Gemini, But Infinite Scaler Was the Real Twister "Gemma 4 Analyzed My Bank Statements – Apparently I 'Have a Problem' with Coffee and Late-Night Apps" #css #webdev #beginners #codenewbie The Hidden Layer Every AI Developer Must Learn AlphaEvolve: Google DeepMind's Gemini-Powered Evolutionary Coding Agent
How to audit what your IDE extension actually sends to the cloud
Alan West · 2026-05-22 · via DEV Community

The problem nobody warns you about

I installed a new AI coding assistant last month. Within a week, my laptop fan was spinning constantly, my battery drained twice as fast, and I noticed weird spikes in network activity even when I wasn't actively using the tool.

That got me curious. What is this thing actually sending?

If you've ever wondered the same about an IDE extension, a CLI tool, or a "helpful" agent that magically integrates with your editor, this post is for you. I've been debugging this exact class of problem across three projects, and the toolkit is surprisingly approachable once you sit down with it.

Why you can't just "read the privacy policy"

Here's the uncomfortable truth: an IDE extension typically runs with the same permissions as your editor process. That means it can:

  • Read every file in your open workspace (and often beyond)
  • Make arbitrary outbound HTTPS connections
  • Spawn subprocesses
  • Access environment variables (hello, AWS_SECRET_ACCESS_KEY)
  • Watch your filesystem for changes

Privacy policies tell you what the vendor intends to collect. They don't tell you what's actually leaving your machine right now. And because almost everything is HTTPS, you can't just tcpdump it and call it a day.

The root cause of the visibility gap is TLS. Encrypted traffic looks like noise unless you control one of the endpoints, and most network monitors stop at the connection metadata.

Step 1: See connections at the process level

Before you go deep, just look. On macOS or Linux, lsof shows you what's open right now:

# List all network connections for a specific process by name
lsof -i -P -n | grep -i 'code\|cursor\|node'

# Or by PID once you know it
lsof -p 12345 -i -P -n

Enter fullscreen mode Exit fullscreen mode

On Linux specifically, ss is faster and more modern than netstat:

# Show TCP/UDP sockets with the owning process
ss -tunap | grep <pid>

Enter fullscreen mode Exit fullscreen mode

This gives you the hostnames and ports your extension is talking to. You'll usually spot a CDN endpoint, a telemetry endpoint, and the actual API. That alone is informative — if you see connections to a domain you've never heard of, that's a thread worth pulling.

Step 2: Intercept the TLS traffic

Knowing that something is talking to telemetry.example.com isn't the same as knowing what it's saying. To read the payload, you need a man-in-the-middle proxy that you explicitly trust.

mitmproxy is the gold standard here. It's free, open source, and Python-scriptable.

# Install via pipx so it doesn't pollute your global Python
pipx install mitmproxy

# Start the interactive TUI on port 8080
mitmproxy --listen-port 8080

Enter fullscreen mode Exit fullscreen mode

The trick is getting your editor's traffic to flow through it. Two approaches I've used:

Approach A — HTTP_PROXY environment variables. Many extensions written in Node honor these:

# Launch your editor with proxy variables set
HTTPS_PROXY=http://127.0.0.1:8080 \
HTTP_PROXY=http://127.0.0.1:8080 \
NODE_EXTRA_CA_CERTS=~/.mitmproxy/mitmproxy-ca-cert.pem \
/Applications/YourEditor.app/Contents/MacOS/YourEditor

Enter fullscreen mode Exit fullscreen mode

The NODE_EXTRA_CA_CERTS bit matters. Without trusting the mitmproxy CA, Node will reject the intercepted certificate and the extension will fail silently or fall back to who-knows-what.

Approach B — System-wide proxy. If the extension ignores environment variables (and many do, sadly), set the proxy at the OS level and install the mitmproxy root cert into the system trust store. On macOS:

# Add mitmproxy's CA to the system keychain and trust it
sudo security add-trusted-cert -d -r trustRoot \
  -k /Library/Keychains/System.keychain \
  ~/.mitmproxy/mitmproxy-ca-cert.pem

Enter fullscreen mode Exit fullscreen mode

Only do this on a throwaway machine or VM. You're adding a CA that can sign certs for any domain. Roll it back when you're done auditing.

Step 3: Inspect the actual payloads

Once traffic is flowing through mitmproxy, you'll see requests stream in. The interesting ones are usually POST requests to whatever the vendor's ingestion endpoint is. Here's a small mitmproxy script I keep around for dumping bodies to disk:

# dump_bodies.py — save every request body to a timestamped file
import time
import pathlib

OUT = pathlib.Path("/tmp/proxy-dump")
OUT.mkdir(exist_ok=True)

def request(flow):
    # Skip GETs and empty bodies to reduce noise
    if flow.request.method == "GET" or not flow.request.content:
        return
    ts = int(time.time() * 1000)
    host = flow.request.pretty_host.replace("/", "_")
    path = OUT / f"{ts}_{host}.bin"
    path.write_bytes(flow.request.content)

Enter fullscreen mode Exit fullscreen mode

Run it like this:

mitmdump -s dump_bodies.py --listen-port 8080

Enter fullscreen mode Exit fullscreen mode

Then open every file in /tmp/proxy-dump and look. You're hunting for things that shouldn't be there: file paths from outside the workspace, environment variable names, snippets of code you didn't intentionally share, contents of .env files, hostnames of internal services.

I ran this on a popular extension last quarter and was genuinely surprised at how much workspace metadata was being shipped on every keystroke. Not the file contents — but enough structural information that you could probably reconstruct the directory layout.

Step 4: Watch the filesystem too

Network is only half the story. An extension might cache things locally, write to your home directory, or stash credentials in unexpected places. Use fs_usage on macOS or inotifywait on Linux:

# macOS: watch all filesystem activity for a process
sudo fs_usage -w -f filesys | grep <process_name>

# Linux: recursive watch on the home directory
inotifywait -mr ~ --format '%w%f %e' 2>/dev/null

Enter fullscreen mode Exit fullscreen mode

This is noisy. Filter aggressively. But it'll catch things like an extension writing telemetry blobs to ~/.cache/<vendor>/ that you'd never notice otherwise.

Prevention: how to not get burned in the first place

A few habits that have saved me real headaches:

  • Audit before you install, not after. Spin up a clean VM, install the extension, and run the steps above for an hour. If the traffic looks weird, you know before you've committed your real workflow to it.
  • Isolate per-project workspaces. Don't open your monorepo with secrets at the root in the same editor session as a sketchy extension. Trust boundaries should match your tolerance.
  • Watch your .env files. Most extensions claim they exclude these. Verify by putting a canary string in a fake .env and searching the intercepted traffic for it.
  • Pin extension versions. Updates can change behavior overnight. If you've audited version 1.4.2, lock it. Re-audit before bumping.
  • Keep a baseline. Save the list of endpoints an extension contacts in week one. If new domains show up in week six, that's a signal worth investigating.

The bigger lesson

The tools we plug into our editors have grown enormously powerful in the last couple of years, and the trust we extend them has grown alongside. That's fine — productivity wins matter — but trust without verification is just hope.

The good news is the verification toolkit is right there. lsof, mitmproxy, fs_usage. An afternoon with these gives you a much clearer picture of your development environment than any privacy policy ever will.

If you find something interesting when you run this on your own setup, I'd genuinely love to hear about it. The more of us doing this kind of auditing, the harder it gets for sketchy behavior to hide in plain sight.