PANews reported on September 5th that, according to Cointelegraph, cybersecurity firm HiddenLayer reported that the AI programming tool Cursor suffers from a "CopyPasta License Attack" vulnerability. Hackers can trick the AI tool into injecting exploits into the codebase by hiding malicious instructions in the LICENSE.txt and README.md files. This tool, widely used by crypto exchanges such as Coinbase, exploits Markdown comments to hide prompt injections, causing the AI to automatically spread malicious payloads when editing files. Testing has also revealed that AI programming tools such as Windsurf, Kiro, and Aider are also vulnerable. The malicious code can create backdoors, steal sensitive data, or paralyze systems, and can be deeply hidden to avoid detection. When HiddenLayer creates tests for a repository containing a virus, Cursor automatically copies the prompt injection into the newly generated file. The company warns that this mechanism could have more serious consequences, including compromising critical files in development and production environments. In August, the Coinbase engineering team stated that Cursor was the preferred tool for most of its developers, and as of February, it had become the preferred tool for all engineers.PANews reported on September 5th that, according to Cointelegraph, cybersecurity firm HiddenLayer reported that the AI programming tool Cursor suffers from a "CopyPasta License Attack" vulnerability. Hackers can trick the AI tool into injecting exploits into the codebase by hiding malicious instructions in the LICENSE.txt and README.md files. This tool, widely used by crypto exchanges such as Coinbase, exploits Markdown comments to hide prompt injections, causing the AI to automatically spread malicious payloads when editing files. Testing has also revealed that AI programming tools such as Windsurf, Kiro, and Aider are also vulnerable. The malicious code can create backdoors, steal sensitive data, or paralyze systems, and can be deeply hidden to avoid detection. When HiddenLayer creates tests for a repository containing a virus, Cursor automatically copies the prompt injection into the newly generated file. The company warns that this mechanism could have more serious consequences, including compromising critical files in development and production environments. In August, the Coinbase engineering team stated that Cursor was the preferred tool for most of its developers, and as of February, it had become the preferred tool for all engineers.

Coinbase's preferred AI programming tool, Cursor, is at risk of being hijacked by a new virus.

2025/09/05 12:45

PANews reported on September 5th that, according to Cointelegraph, cybersecurity firm HiddenLayer reported that the AI programming tool Cursor suffers from a "CopyPasta License Attack" vulnerability. Hackers can trick the AI tool into injecting exploits into the codebase by hiding malicious instructions in the LICENSE.txt and README.md files. This tool, widely used by crypto exchanges such as Coinbase, exploits Markdown comments to hide prompt injections, causing the AI to automatically spread malicious payloads when editing files. Testing has also revealed that AI programming tools such as Windsurf, Kiro, and Aider are also vulnerable. The malicious code can create backdoors, steal sensitive data, or paralyze systems, and can be deeply hidden to avoid detection.

When HiddenLayer creates tests for a repository containing a virus, Cursor automatically copies the prompt injection into the newly generated file. The company warns that this mechanism could have more serious consequences, including compromising critical files in development and production environments. In August, the Coinbase engineering team stated that Cursor was the preferred tool for most of its developers, and as of February, it had become the preferred tool for all engineers.

Market Opportunity
Prompt Logo
Prompt Price(PROMPT)
$0.04847
$0.04847$0.04847
-2.96%
USD
Prompt (PROMPT) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.