So following on from https://www.koi.ai/blog/glassworm-first-self-propagating-worm-using-invisible-code-hits-openvsx-marketplace, I managed to find the "offending" code and I'm currently working out what's going on.
So the invisible characters are all unicode variation selector characters (https://en.wikipedia.org/wiki/Variation_Selectors_(Unicode_block)) which are usually invisible but punt the source code into a hex editor and we can see:
With the hidden code in line 3 and it loads an infected index_$platform.node file to do the decoding, With a little poking I got it to, instead of executing, simply dump the decoded data which now looks like this:
Once we base64 decode the above, we can see the realsource code