Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security IT

Snyk Researcher Caught Deploying Malicious Code Targeting AI Startup (sourcecodered.com) 3

A Snyk security researcher has published malicious NPM packages targeting Cursor, an AI coding startup, in what appears to be a dependency confusion attack. The packages, which collect and transmit system data to an attacker-controlled server, were published under a verified Snyk email address, according to security researcher Paul McCarty.

The OpenSSF package analysis scanner flagged three packages as malicious, generating advisories MAL-2025-27, MAL-2025-28 and MAL-2025-29. The researcher deployed the packages "cursor-retrieval," "cursor-always-local" and "cursor-shadow-workspace," likely attempting to exploit Cursor's private NPM packages of the same names.

Snyk Researcher Caught Deploying Malicious Code Targeting AI Startup

Comments Filter:
  • So if I'm connecting the dots right... basically some bad guy at a legitimate security scanner company is trying to steal credentials from a company that makes a code editor used by big companies like Shopify. I can imagine they might want credit card numbers en masse? Not stated, but would be interesting to know if the code scanner company has access to code editor's company so they knew what to name the fake repo.
  • ... not sorry - couldn't resist

If you sell diamonds, you cannot expect to have many customers. But a diamond is a diamond even if there are no customers. -- Swami Prabhupada

Working...