Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories
Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories — [https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHAKp4IJAmSi

What’s new: A security flaw in the Cursor AI code editor allows for silent code execution when a malicious repository is opened. The vulnerability arises from the default disabling of the Workspace Trust feature, enabling attackers to execute arbitrary code upon opening a project folder. This could lead to sensitive data leaks or broader system compromises.
Who’s affected
Users of the Cursor AI code editor, particularly those who open untrusted repositories without enabling Workspace Trust, are at risk of arbitrary code execution and potential supply chain attacks.
What to do
- Enable Workspace Trust in Cursor to prevent unauthorized code execution.
- Open untrusted repositories in a different code editor for auditing before using them in Cursor.
- Regularly review and audit code repositories for malicious configurations.