CursorJacking
PulseAugur coverage of CursorJacking — every cluster mentioning CursorJacking across labs, papers, and developer communities, ranked by signal.
1 day(s) with sentiment data
-
Cursor code editor vulnerable to API key theft via browser extensions
Security researchers have discovered a vulnerability dubbed "CursorJacking" affecting the Cursor code editor. This vulnerability allows malicious browser extensions to access a user's SQLite database, which may contain …
-
Cursor and Claude Code targeted by new malware and vulnerabilities
A security vulnerability dubbed CursorJacking has been discovered, allowing browser extensions to access user API keys stored in the SQLite database of the AI-powered code editor Cursor. Separately, a new variant of the…
-
Google Gemini CLI hit with CVSS 10.0 RCE, breaking trust boundaries
A critical vulnerability with a CVSS score of 10.0 has been discovered in Google's Gemini CLI, allowing an attacker to execute arbitrary code by submitting a pull request that includes a malicious configuration file. Th…