'CursorJack’ Attack Path Exposes Code Execution Risk in AI Development Environment
ATT&CK techniques detected
T1204.001Malicious Link
88%
"' cursorjack ’ attack path exposes code execution risk in ai development environment a method that could enable code execution through manipulated installation links in an ai development environment has been identified by security researchers. the technique, dubbed cursorjack by …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
CursorJack shows how malicious MCP deeplinks in Cursor IDE can trigger user-approved code execution