
I Built a GlassWorm Detector — Here's How Invisible Unicode Attacks Actually Work
Last week, I opened a VS Code extension file that looked perfectly normal. Five lines of clean JavaScript. A standard import , an activate function, a console.log . Nothing suspicious. Except line 2 — an empty line — was carrying 246 bytes of hidden malicious code. Not obfuscated. Not minified. Not buried in a dependency. Literally invisible. The characters were in the file, taking up space on disk, but my editor rendered them as nothing. A blank line. Empty air. That's GlassWorm — the first self-propagating worm to use invisible Unicode characters to hide malware in VS Code extensions. It has infected 35,800+ machines across 5 waves since October 2025, compromised 151+ GitHub repositories, and as of March 2026, it's still spreading. I spent the past week reverse-engineering the encoding technique, building detection tools, and creating an interactive educational demo. Everything is open-sourced. This article walks through what I found. The trick in 60 seconds Every character you type
Continue reading on Dev.to JavaScript
Opens in a new tab

![[MM’s] Boot Notes — The Day Zero Blueprint — Test Smarter on Day One](/_next/image?url=https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1368%2F1*AvVpFzkFJBm-xns4niPLAA.png&w=1200&q=75)

