Attacks & Vulnerabilities
|
Cursor AI Vulnerability Exposed Developer Devices (3 minute read)
Straiker found a NomShub attack chain in Cursor that abuses indirect prompt injection and a sandbox escape to overwrite .zshenv and run attacker-controlled code on macOS. Malicious prompts in a repository README prompt the AI agent to open a remote tunnel, register a device code, and authorize the attacker's GitHub account for shell access, which persists until the process stops and the tunnel registration is removed.
|
Vercel Confirms Breach as Hackers Claim to be Selling Stolen Data (2 minute read)
Cloud development platform Vercel has disclosed a security incident after attackers claiming to be affiliated with ShinyHunters are attempting to sell stolen data. The attacker claims to be selling access keys, source code, and database data, as well as access to internal deployments and API keys. Vercel has stated that they are in contact with a limited number of affected customers.
|
|
MAD Bugs: "cat readme.txt" is not safe in iTerm2 (5 minute read)
iTerm2's SSH integration uses a “conductor” script and escape‑sequence protocol over PTY, but it will accept that protocol from any terminal output, not just a trusted remote session. A crafted readme file can print fake DCS 2000p and OSC 135 sequences, impersonate the conductor, walk the state machine, and push iTerm2 into sending a base64‑encoded run command back into the local shell. An attacker bundles a helper binary named to match the final base64 chunk, so simply running cat readme.txt in that directory triggers arbitrary command execution until users install the still‑unstable patch.
|
Six Accounts, One Actor: Inside the prt-scan Supply Chain Campaign (9 minute read)
Wiz Research linked a prt-scan campaign to March 11, three weeks before disclosure, involving six GitHub accounts and over 500 malicious PRs exploiting pull_request_target with AI payloads targeting Python, Node.js, Rust, and Go. The five-phase payload had a sub-10% success rate but compromised 106 versions in @codfish/eslint-config and @codfish/actions, stealing AWS, Cloudflare, and Netlify credentials via a /proc/*/environ scanner that exfiltrated secrets through PR comments. Search for prt-scan-[12-hex] branch, PR title "ci: update build configuration," user agent python-requests/2.32.5, and log markers PRT_EXFIL/RECON/DELAYED; enforce first-time contributor approval and actor-restricted workflows on repos using pull_request_target.
|
|
Wardgate (GitHub Repo)
Wardgate is a security gateway that sits between AI agents and the outside world, manages API credentials, isolates SSH keys for remote command execution, and enforces access controls for command execution in remote enclaves. This is a relatively new tool with an AGPL license and was first released in February.
|
Claude Code in a devcontainer (GitHub Repo)
A sandboxed development environment for running Claude Code with bypassPermissions safely. This devcontainer provides filesystem isolation, so you get the productivity benefits of unrestricted Claude without risking your host system. This tool was built by TrailOfBits for Security Audit workflows.
|
|
Claude Opus wrote a Chrome exploit for $2,283 (2 minute read)
Claude Opus 4.6 can be used to build a working exploit chain for Chrome's V8 engine, targeting Discord's outdated Chrome 138 base and spending about $2,283 in API calls plus 20 hours of guidance. Patch notes and public commits now act as exploit roadmaps. Any patient attacker with an API key can weaponize these bugs. Developers should use earlier-in-life-lifecycle security, faster dependency updates, automatic patching, and tighter handling of public vulnerability details in projects like V8.
|
|
4 new Android malware families target 800+ apps (1 minute read)
Zimperium zLabs discovered four new Android malware families (RecruitRat, SaferRat, Astrinox, and Massiv) that are distributed via phishing/smishing APKs and abuse Accessibility Services to perform overlay attacks, keylogging, and data exfiltration against over 800 banking and crypto apps.
|
|
Love TLDR? Tell your friends and get rewards! |
|
Share your referral link below with friends to get free TLDR swag!
|
|
|
| Track your referrals here. |
|
|
|
0 Comments