Navigation
Recherche
|
Snyk Researcher Caught Deploying Malicious Code Targeting AI Startup
mardi 14 janvier 2025, 10:20 , par Slashdot
A Snyk security researcher has published malicious NPM packages targeting Cursor, an AI coding startup, in what appears to be a dependency confusion attack. The packages, which collect and transmit system data to an attacker-controlled server, were published under a verified Snyk email address, according to security researcher Paul McCarty.
The OpenSSF package analysis scanner flagged three packages as malicious, generating advisories MAL-2025-27, MAL-2025-28 and MAL-2025-29. The researcher deployed the packages 'cursor-retrieval,' 'cursor-always-local' and 'cursor-shadow-workspace,' likely attempting to exploit Cursor's private NPM packages of the same names. Read more of this story at Slashdot.
https://it.slashdot.org/story/25/01/14/0920245/snyk-researcher-caught-deploying-malicious-code-targe...
Voir aussi |
56 sources (32 en français)
Date Actuelle
ven. 21 févr. - 22:27 CET
|