"local storage, any extension can directly query the database. this applies even to extensions that request no special permissions, making detection difficult. researchers demonstrated that a malicious extension could retrieve : - api keys tied to third - party services - session …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1176Software Extensions
89%
"be used to access third - party platforms such as openai, anthropic or google services. this creates several downstream risks : - unauthorized api usage leading to financial loss - exposure of prompts, outputs and metadata - potential misuse of services for further attacks withou…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1176.002IDE Extensions
88%
"be used to access third - party platforms such as openai, anthropic or google services. this creates several downstream risks : - unauthorized api usage leading to financial loss - exposure of prompts, outputs and metadata - potential misuse of services for further attacks withou…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1176.002IDE Extensions
84%
"local storage, any extension can directly query the database. this applies even to extensions that request no special permissions, making detection difficult. researchers demonstrated that a malicious extension could retrieve : - api keys tied to third - party services - session …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1176.002IDE Extensions
79%
"cursor extension flaw exposes developer api keys a high - severity vulnerability in the ai - powered development tool cursor allows installed extensions to access sensitive credentials, exposing api keys and session tokens without any user interaction. according to research by la…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1176.001Browser Extensions
73%
"local storage, any extension can directly query the database. this applies even to extensions that request no special permissions, making detection difficult. researchers demonstrated that a malicious extension could retrieve : - api keys tied to third - party services - session …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1176Software Extensions
57%
"cursor extension flaw exposes developer api keys a high - severity vulnerability in the ai - powered development tool cursor allows installed extensions to access sensitive credentials, exposing api keys and session tokens without any user interaction. according to research by la…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at LayerX