Vulnerability Summary Title: [Kimi VS Code] Command Injection in publish scripts vsix-publish.js and ovsx-publish.js Package: moonshot.kimi-code Affected Versions: 0.1.5 Patched Versions: 0.1.6 Severity: Low (2.9/10) CVE ID: CVE-2026-25046 Description The vsix-publish.js and ovsx-publish.js scripts pass filenames to execSync() as shell command strings. Filenames containing shell metacharacters like $(cmd) could execute arbitrary commands. This vulnerability exists only in the repository's development scripts. The published VSCode extension does not include these files and end users are not affected. Impact Attack Vector: Local Attack Complexity: High Privileges Required: High User Interaction: Required Scope: Unchanged Confidentiality: Low Integrity: Low Availability: None Patches Fixed in version X.X.X by replacing execSync with execFileSync using array arguments. Workarounds Ensure .vsix files in the project directory have safe filenames before running publish scripts.