PulseAugur
LIVE 01:52:34
tool · [1 source] · · Polski(PL) CursorJacking – rozszerzenia mają dostęp do bazy SQLite z kluczami API użytkowników https:// sekurak.pl/cursorjacking-rozsz erzenia-maja-dostep-do-bazy-sqlite-z
0
tool

Cursor code editor vulnerable to API key theft via browser extensions

Security researchers have discovered a vulnerability dubbed "CursorJacking" affecting the Cursor code editor. This vulnerability allows malicious browser extensions to access a user's SQLite database, which may contain sensitive API keys. The issue highlights the potential risks associated with granting extensive permissions to browser extensions, especially when they interact with local data stores. AI

Summary written by gemini-2.5-flash-lite from 1 source. How we write summaries →

IMPACT Highlights security risks in developer tools that integrate AI features, potentially exposing sensitive credentials.

RANK_REASON Security vulnerability discovered in a specific software tool.

Read on Mastodon — sigmoid.social →

COVERAGE [1]

  1. Mastodon — sigmoid.social TIER_1 Polski(PL) · [email protected] ·

    CursorJacking – extensions have access to the SQLite database with user API keys https:// sekurak.pl/cursorjacking-rozsz erzenia-maja-dostep-do-bazy-sqlite-z

    CursorJacking – rozszerzenia mają dostęp do bazy SQLite z kluczami API użytkowników https:// sekurak.pl/cursorjacking-rozsz erzenia-maja-dostep-do-bazy-sqlite-z-kluczami-api-uzytkownikow/ # Wbiegu # Ai # Bezpieczestwo # Cursor # Wtyczki