Overview
Description
Currently, revoking a malicious publisher is a purely manual process executed through the Open VSX Admin UI. During coordinated mass malware attacks, this manual workflow creates a severe bottleneck, increasing the Mean Time to Remediate (MTTR).
We need a secure, scriptable API endpoint to programmatically revoke publishers in bulk. Additionally, this endpoint must trigger an updated core revocation logic that completely severs the relationship between the revoked publisher and its claimed namespace(s).
Acceptance Criteria
cc @kineticsquid
Overview
Description
Currently, revoking a malicious publisher is a purely manual process executed through the Open VSX Admin UI. During coordinated mass malware attacks, this manual workflow creates a severe bottleneck, increasing the Mean Time to Remediate (MTTR).
We need a secure, scriptable API endpoint to programmatically revoke publishers in bulk. Additionally, this endpoint must trigger an updated core revocation logic that completely severs the relationship between the revoked publisher and its claimed namespace(s).
Acceptance Criteria
cc @kineticsquid