This article demonstrates how a vulnerability in one of the VS Code URL handlers could lead to the execution of arbitrary commands on the victim's host.
This article aims to paint the portrait of three approaches that will allow you to proactively assess the level of security of all or part of your computer system.