GlassWorm Campaign Targets Developer IDEs via Zig Dropper

The GlassWorm campaign uses a Zig-compiled dropper to infect developer IDEs. Learn how it works, what's at risk, and how to protect your dev environment.
Security researchers have identified a new threat campaign called GlassWorm, which uses a dropper compiled in Zig to systematically infect developer IDEs across multiple platforms. The GlassWorm campaign is notable not just for its reach but for its deliberate targeting of development tooling, turning the tools engineers trust most into infection vectors.
How the Zig Dropper Works in the GlassWorm Campaign
Zig is a relatively young systems programming language, and that matters here. Most endpoint detection tools have mature signatures for malware written in C, C++, Rust, or Go. Zig-compiled binaries slip past a significant number of these detections because the language produces non-standard binary layouts and has a small enough ecosystem that security vendors have limited telemetry on it.
The GlassWorm dropper arrives through compromised plugin repositories, malicious IDE extensions, or poisoned package dependencies. Once executed inside the developer's environment, it establishes persistence by hooking into the IDE's extension loading mechanism. From there, it can read files opened in the editor, exfiltrate tokens and credentials stored in config files, and drop secondary payloads into project directories.
The attack chain is relatively short. The dropper lands, identifies which IDE is running (VS Code, JetBrains, Neovim configurations, and others have all been observed as targets), then adjusts its persistence method accordingly. Each IDE has a different plugin or configuration directory, and GlassWorm has pre-built routines for each one.
Why Developer Environments Are High-Value Targets
Developers sit at an unusually dangerous position in the attack surface. A compromised developer machine typically holds AWS or GCP credentials, SSH keys, API tokens, database connection strings, and access to internal repositories. Attackers who can plant something inside an IDE get passive access to all of it, without needing to escalate privileges or move laterally in obvious ways.
GlassWorm takes advantage of this by operating quietly inside a process developers expect to consume resources. An IDE doing background indexing or running a language server is normal. A dropper hiding inside that same process space is much harder to notice.
Impact on Development Teams and CI/CD Pipelines
The downstream risk extends well beyond the individual machine. If a developer's environment is compromised, any secrets committed to version control, any build scripts modified, or any Docker images pushed to a registry become suspect. GlassWorm has been observed injecting small modifications into build configuration files, which then propagate through CI/CD pipelines before anyone notices something is wrong.
Teams using shared plugin configurations or dotfile repositories face compounded risk. One infected developer can become a distribution point for the rest of the team.
How to Protect Your Development Environment
Start by auditing every installed IDE extension and plugin against their official sources. Anything installed from a third-party marketplace or a direct URL deserves scrutiny. Pin extension versions where possible and monitor for unexpected updates.
Run your IDE with the minimum filesystem permissions needed. Avoid running editors as root or administrator. Use separate credential stores with scoped access rather than dropping long-lived tokens into flat config files.
Enable behavioral monitoring on your developer workstations, not just signature-based antivirus. Tools that track process behavior and file access patterns will catch GlassWorm activity where traditional AV won't.
Scan your web-facing assets and build tooling regularly. You can run a free scan at VibeWShield to check for exposure in your publicly accessible infrastructure.
Review your CI/CD pipeline configuration files after any suspected compromise. Compare them against known-good commits in version control before running any builds.
How does GlassWorm avoid detection by standard antivirus tools? The dropper is compiled in Zig, a language with limited AV signature coverage. It also hides within normal IDE process activity, making behavioral detection harder without dedicated endpoint monitoring tools.
Which IDEs are confirmed targets of the GlassWorm campaign? Researchers have observed routines targeting VS Code, JetBrains-based editors, and Neovim setups. The dropper identifies the running IDE and adapts its persistence mechanism accordingly.
Can GlassWorm spread through shared team configurations? Yes. If a developer shares dotfiles or plugin configurations through a repository, an infected setup can propagate the dropper to other team members who pull those configs.
Check your web infrastructure for related exposure. Run a free scan with VibeWShield.
Free security scan
Is your app vulnerable to similar attacks?
VibeWShield automatically scans for these and 18 other security checks in under 3 minutes.
Scan your app free