Sunday, March 22, 2026
Digital Pulse
No Result
View All Result
  • Home
  • Bitcoin
  • Crypto Updates
    • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Analysis
  • Regulations
  • Scam Alert
Crypto Marketcap
  • Home
  • Bitcoin
  • Crypto Updates
    • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Analysis
  • Regulations
  • Scam Alert
No Result
View All Result
Digital Pulse
No Result
View All Result
Home Crypto Updates

Malicious Repos Can Trigger Auto Code Execution in Cursor

Digital Pulse by Digital Pulse
September 13, 2025
in Crypto Updates
0
Malicious Repos Can Trigger Auto Code Execution in Cursor
2.4M
VIEWS
Share on FacebookShare on Twitter


Loved this text?

Share it with your pals!

Oasis Safety has recognized a vulnerability in Cursor, an AI-based code editor, that permits hidden code to run as quickly as a consumer opens a challenge folder with none motion or warning.

The problem comes from a default setting in Cursor. A security function known as Workspace Belief is disabled by default when this system is first put in. Consequently, sure process recordsdata can start executing instructions instantly when a developer opens a folder.

If a consumer provides a dangerous process to a challenge and shares it on-line, these instructions will run as quickly as one other individual opens the folder in Cursor.

Do you know?

Need to get smarter & wealthier with crypto?

Subscribe – We publish new crypto explainer movies each week!

What’s Odysee & LBRY? Is Decentralized YouTube Potential? (ANIMATED)

What is Odysee & LBRY? Is Decentralized YouTube Possible? (ANIMATED)
What is Odysee & LBRY? Is Decentralized YouTube Possible? (ANIMATED)

Cursor is constructed on prime of Visible Studio Code, which additionally consists of the Workspace Belief function. This instrument is designed to guard builders from malicious code by blocking computerized duties from unknown sources.

The vulnerability exploits the .vscode/duties.json file, which might include directions to run duties as quickly as a folder is opened. Attackers can place these directions in a shared challenge.

In accordance with Erez Schwartz from Oasis Safety, this conduct can result in stolen credentials, modified recordsdata, or system entry. It additionally will increase the possibilities of provide chain assaults, the place malicious code spreads by means of instruments or tasks utilized by many individuals.

To remain protected, customers ought to take just a few steps. First, they need to allow Workspace Belief in Cursor to cease unknown duties from working mechanically. Second, it’s suggested to open untrusted tasks utilizing a unique code editor, particularly the .vscode folder, earlier than utilizing Cursor.

On August 28, Anthropic warned that dangerous actors are utilizing its chatbot Claude to assist perform on-line crimes. How? Learn the complete story.



Source link

Tags: AutoCodeCursorExecutionMaliciousRepostrigger
Previous Post

Nicholas Galanin pulls out of Smithsonian event, claiming censorship – The Art Newspaper

Next Post

Dogecoin and BNB Rise as Bitcoin, Ethereum Hit Highest Prices This Month

Next Post
Dogecoin and BNB Rise as Bitcoin, Ethereum Hit Highest Prices This Month

Dogecoin and BNB Rise as Bitcoin, Ethereum Hit Highest Prices This Month

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Facebook Twitter
Digital Pulse

Blockchain 24hrs delivers the latest cryptocurrency and blockchain technology news, expert analysis, and market trends. Stay informed with round-the-clock updates and insights from the world of digital currencies.

Categories

  • Altcoin
  • Analysis
  • Bitcoin
  • Blockchain
  • Crypto Exchanges
  • Crypto Updates
  • DeFi
  • Ethereum
  • Metaverse
  • NFT
  • Regulations
  • Scam Alert
  • Web3

Latest Updates

  • Hawk Tuah Influencer Says Memecoin Collapse Left Her Traumatized, But Critics Push Back
  • Resolv Protocol Stalls With Attacker An Minting 50 Million Unbacked USR Tokens
  • Ethereum OG Whale Returns To Market With $19.5M ETH Buy — Details

Copyright © 2024 Digital Pulse.
Digital Pulse is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Bitcoin
  • Crypto Updates
    • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Analysis
  • Regulations
  • Scam Alert

Copyright © 2024 Digital Pulse.
Digital Pulse is not responsible for the content of external sites.