frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Don't Build Multi-Agents

https://cognition.ai/blog/dont-build-multi-agents#a-theory-of-building-long-running-agents
1•Anon84•1m ago•0 comments

Ask HN: What can we do to stop genocide in Gaza?

2•hngaza•1m ago•0 comments

ChatGPT vs. Lawyers

https://legaladvicenow.ai/why
1•amedeus72•2m ago•0 comments

International Treaty on Plant Genetic Resources for Food and Agriculture

https://www.fao.org/plant-treaty/overview/en/
1•mooreds•2m ago•0 comments

There is std:chrono:high_resolution_clock, but no low_resolution_clock

https://devblogs.microsoft.com/oldnewthing/20250714-00/?p=111375
1•signa11•3m ago•0 comments

Analysis of TTFF (Time to First Failure) in CI Processes (2024)

https://rstudio-pubs-static.s3.amazonaws.com/1225019_b204808cff94424b9a08a4b23e179c80.html
1•jawns•5m ago•0 comments

Show HN: Recursive Intelligence – Theory and Artifact (600 Downloads on Zenodo)

https://zenodo.org/records/15713252
1•bazifti•6m ago•0 comments

Claude Code Has Gone from Game-Changer to Garbage

https://old.reddit.com/r/ClaudeAI/comments/1lzuy0j/claude_code_has_gone_from_gamechanger_to_garbage/
1•jcmontx•7m ago•1 comments

Weaponizing Shopify MCP for Highly Persuasive Selling

https://www.tramlines.io/blog/shopify-sellers-can-abuse-shopify-mcp-to-manipulate-customer-purchase-decisions
1•coderinsan•7m ago•0 comments

Everything You Need to Get Started in Magnet Fishing (2022)

https://www.popularmechanics.com/adventure/outdoor-gear/a39679643/everything-you-need-to-get-started-in-magnet-fishing/
1•jawns•8m ago•0 comments

A Minimal DDPM

https://github.com/metalwhale/minimal-ddpm/blob/main/minimal_ddpm/README.md
1•metalwhale•9m ago•1 comments

Private financing for Argentina's lithium is anything but green, critics say

https://news.mongabay.com/2025/07/private-financing-for-argentinas-lithium-is-anything-but-green-critics-say/
1•PaulHoule•10m ago•0 comments

LibreOffice Now Supports Bitcoin

https://www.neowin.net/news/another-blow-for-ms-office-libreoffice-brings-feature-ms-office-has-had-for-almost-10-years/
1•bundie•12m ago•1 comments

Show HN: Simulating Autonomous Drone Formations

https://github.com/sushrut141/ketu
1•wanderinglight•12m ago•0 comments

Why Everyone You Know Is Suddenly a Birder

https://thewalrus.ca/birding/
1•pseudolus•12m ago•0 comments

Ask HN: What's Your Useful Local LLM Stack?

1•Olshansky•13m ago•0 comments

Kubernetes Solves Its Biggest Problem: Managing Databases

https://thenewstack.io/kubernetes-finally-solves-its-biggest-problem-managing-databases/
2•eatonphil•15m ago•0 comments

Lessons from a Chimp: AI "Scheming" and the Quest for Ape Language

https://arxiv.org/abs/2507.03409
1•oatsandsugar•15m ago•0 comments

Real reasons people do not have the number of children they want

https://www.theguardian.com/global-development/2025/jun/10/un-population-fund-unfpa-report-reasons-falling-global-fertility
2•franczesko•16m ago•1 comments

Microsoft deleted article on restoring old context menu

https://answers.microsoft.com/en-us/windows/forum/all/restore-old-right-click-context-menu-in-windows-11/a62e797c-eaf3-411b-aeec-e460e6e5a82a?from=GetHelpBCQR&CorrelationId=e5aed643-885d-4035-8652-0412c87230da&ocid=OO_Core_NEU_GetHelp_DG_GetHelp_Solutions
1•tkuraku•18m ago•3 comments

Defeating Memory Leaks with Zig Allocators

https://tgmatos.github.io/defeating-memory-leaks-with-zig-allocators/
1•gilgamesh3•18m ago•0 comments

Guy Attached 21 Chef's Knives to a Robot Arm to Determine Which One Is Best

https://www.wired.com/story/quantified-knife-project/
3•randfish•19m ago•1 comments

The US Civil War battlefield at the centre of a new conflict

https://www.bbc.com/future/article/20250711-the-last-battle-of-the-us-civil-war-is-against-ai
2•nradov•20m ago•0 comments

Israeli research finds that when plants talk, insects listen

https://www.aol.com/israeli-research-finds-plants-talk-143538615.html
2•Bluestein•20m ago•0 comments

Secret changes to major U.S. health datasets raise alarms

https://www.psypost.org/secret-changes-to-major-u-s-health-datasets-raise-alarms/
1•DocFeind•21m ago•0 comments

Automatic ball-strike challenge system to be used in 2025 MLB All-Star Game

https://www.mlb.com/news/automatic-ball-strike-challenge-system-to-be-used-in-2025-mlb-all-star-game
1•ChrisArchitect•22m ago•0 comments

LLM Observability with ClickStack, OpenTelemetry, and MCP

https://clickhouse.com/blog/llm-observability-clickstack-mcp
1•lio-p•22m ago•0 comments

Show HN: Use your own CoreML models to control your Mac

https://www.marcoluthi.com/side/mlshortcuts
1•marcoluthi•23m ago•0 comments

Google will spend $3B on hydropower for its AI data centers

https://qz.com/google-spends-3-billion-hydropower-for-ai-data-centers
2•Bluestein•23m ago•0 comments

The FC/FC Chasm: Why Teaching Programming Still Matters

https://blog.charliemeyer.co/the-fcfc-chasm-why-teaching-programming-still-matters/
1•csmeyer•23m ago•0 comments
Open in hackernews

Code highlighting extension for Cursor AI used for $500k theft

https://securelist.com/open-source-package-for-cursor-ai-turned-into-a-crypto-heist/116908/
150•Daviey•5h ago

Comments

christophilus•4h ago
Supply chain attacks really worry me. I do most of my work in docker containers partly as a small attempt to mitigate this. I run the full stack in the container, including Claude Code, Neovim, Postgres, etc.

I do have a fair number of Neovim plugins on my host machine, and a number of Arch packages that I probably could do without.

I’ve considered keeping my host’s Neovim vanilla, but telescope is hard to live without.

aldur•4h ago
Same worries and setup here, with the only difference that I use Nix to either spawn a QEMU VM or build an LXC container that runs on a Chromebook (through Crostini).

I started using throwaway environments, one per project. I try keeping the stuff installed in the host OS to the bare minimum.

For the things I need to run on the host, I try to heavily sandbox it (mostly through the opaque macOS sandbox) so that it cannot access the network and can only access a whitelist of directories. Sandboxing is painful and requires trial an error, so I wish there was a better (UX-wise) way to do that.

bravesoul2•4h ago
Supply chain attacks mean you need to trust your choice of suppliers, trust their security posture and choice of suppliers and so on. Even docker itself has FROM and often a few "apt get" (or similar) commands to build the image. Even with no file access, they can exfiltrate data.

This and MCP, IoT all the things, vibe coding, AI impersonation for social attacks and cryptocurrency rewards it's a golden age for criminal hackers!

throwawayffffas•2h ago
Not just apt-get it might even have some `curl ... | sh`.
chasd00•2h ago
Curl | sh is gold. It’s like finding a candy bar on the street and eating it heh.
dns_snek•1h ago
You can say the same about the vast majority of distribution methods we have. There's no difference between `curl | sh` and executing a binary you download from the internet.
fc417fc802•3h ago
The number of dependencies that require inordinate amounts of effort to build from a clean repository without network access is truly alarming. Even many core tools can't be bootstrapped (at least easily or in a manner supported by the developers) without downloading opaque binary blobs. It's like the entire software ecosystem is underpinned by sketchy characters hanging out in dark alleys who clandestinely slip you the required binaries if you ask nicely.
xinayder•3h ago
Do you use devcontainers or a custom-built solution? Would you mind sharing how you do your dev work using containers? I've been looking to try it out, and this attack might be the tipping point to where I actually do that.
christophilus•25m ago
Custom. I have a little script: “dev sh” which creates a new container for whatever folder I’m in. The container has full access to that folder, but nothing else. If there’s a .podman/env file, the script uses that to configure things like ports, etc.

From what I saw of devcontainers, they basically grant access to your entire system (.ssh, etc). May be wrong. That’s my recollection, though.

riv991•4h ago
Microsoft were very quick to highlight their extensions being safer after this.

https://x.com/code/status/1943720372307665033?s=46

the_mitsuhiko•4h ago
Unfortunately the marketplace ecosystem is why I went back to VSCode from Cursor. I'm a bit upset by this because I don't quite appreciate that Microsoft has a closed ecosystem for the marketplace and does not open it to Cursor but the reality is, that Open VSX does not have all extensions and little vetting.
notpushkin•1h ago
> Open VSX does not have all extensions

This can be solved quite easily for open source extensions: https://github.com/EclipseFdn/open-vsx.org/wiki/Auto-Publish...

Vetting however is trickier. I hope Cursor can fund this effort!

worble•4h ago
And yet, this entire class of abuse is only possible because Microsoft refuse to implement any kind of permission management or sandboxing for extensions.

https://github.com/microsoft/vscode/issues/52116

rs186•3h ago
Second this.

As a vscode extension author, I am scared by the power I have. I am not at all surprised by what happened in this story.

delusional•4h ago
People better remember that tweet the next time somebody finds another malicious extension on their marketplace.
Quarrel•4h ago
and yet, there are many malware extensions per day that get through:

https://github.com/microsoft/vsmarketplace/blob/main/Removed...

jowea•3h ago
2 seconds? That wasn't the team then, it must have failed some automated filter.
bootsmann•3h ago
Yeah it had a copy-paste description from the original extension, probably very easy thing to detect
nkrisc•2h ago
If the team put those filters in place, then it was the team. Anyone implementing automation gets to be held responsible for its failure, but also its successes.
IshKebab•3h ago
Well this was an extremely unsophisticated attack. The malware wasn't hidden and they didn't even bother to actually copy the real extension.

If I were doing this I would copy the real extension, give it a name that made it sound official but in the README say it is a tweaked version with some improvements or whatever. Also actually add some improvements, but hide the malware in those changes.

Good luck finding that. (brb going to try this)

raincole•3h ago
The whole thing worked only because they gamed open-vsx ranking algorithm.
notachatbot123•4h ago
Much less click-baity if a more descriptive title would have been used: "Malicious copy of Cursor AI extension used for $500k theft"
samrus•4h ago
The title does make it sound like the AI itself lead to the vulnerability, which is false

But cursor isnt off the hook. It wasnt a malicious copy, it was a legit copy of the cursor IDE distirbuting a package they allowed on the extension store. This is on them.

The lesson here is to not make a vscode fork if you arent able to maintian it the way microsoft does. Move fast and break (the user's) things i guess

worble•4h ago
The article says they use open-vsx, which is managed by the Eclipse foundation. It's not really anything to do with cursor, other than the fact they're allowing you access to the only other vscode marketplace that all the forks use.
btown•3h ago
The biggest "reveal" here is that open-vsx has far less effective anti-fraud measures than the end users of Cursor, Windsurf, etc. expect.

It seems that an attacker was able to easily manipulate download counts, placing their malicious extension high in search results.

And this is far from the first open-vsx vulnerability in the past month. See: https://blog.koi.security/marketplace-takeover-how-we-couldv... which describes how open-vsx was installing arbitrary packages and running their build scripts in a privileged environment.

And the instructions to report malicious extensions, even now, are practically nonexistent: https://github.com/EclipseFdn/open-vsx.org/wiki/Guidelines-o...

With billions of dollars being poured into this ecosystem, it's mind-boggling that security is being treated as such an afterthought. Consider this when choosing tools.

rwmj•3h ago
Yes, let's blame the guys working on something for free, instead of the company which raised nearly a billion in VC money but couldn't be bothered to check.
btown•1h ago
If you run part of the software supply chain ecosystem, put it on the web without any kind of "alpha" or "insecure" language that's highly visible to end users on every package, and even distribute professional white papers and marketing-style landing pages to promote it (e.g. https://outreach.eclipse.foundation/openvsx), but create a deployment architecture that executes arbitrary third party code during every deploy (as was the case before https://github.com/EclipseFdn/publish-extensions/pull/881/fi... landed to fix the issue in the link above) - I do indeed think that the Eclipse Foundation bears some responsibility here.

And for sure, Cursor and others should have funded security hardening of their extension marketplace. The lion's share of the blame lies on that. But the Eclipse Foundation is in a position to incentivize that investment by making it clear to end users that open-vsx is still at an experimental level of stability and security, rather than promoting it as an enterprise-ready product with white papers and all.

rwmj•1h ago
There are companies that will provide quality guarantees and product liability insurance for open source software (I work for one in fact), so maybe Cursor should have used one of those.
edg5000•3h ago
@rwmj The Eclipse foundation is actually backed by some really big companies. Check out the sponsors page.

(And a fun but irrelevant bonus fact: Eclipse was originally made by IBM)

rwmj•2h ago
For sure, but the membership fees these companies pay are really quite small (bottom of this page https://www.eclipse.org/membership/prospectus/), and they mainly go towards infrastructure, running the working groups, and conferences. The projects get some benefits, but they don't get a lot of full time developers (in fact, I'd be surprised if they get even a fraction of 1 FTE), and are largely run either by volunteers or by people doing this in their 20% time in regular day jobs.

In any case, Cursor didn't pay any money here, so they get to keep all the pieces when the code they used for free breaks.

a_wild_dandan•2h ago
I blame my tool, Cursor. They blame their tool, open-vsx. We're either both right about that logic, or both wrong. Either way, I expect consistency in how the product I pay for assigns/accepts blame. Cursor's response will be interesting.
infecto•4h ago
I am not so sure. They don’t own the registry for extension. Even in VSCode I always thought one should be cautious.
AIPedant•3h ago
Cursor does bear significant responsibility in the sense that OpenVSX transformed from a niche service used by free software nerds into a major component of many developers’ process. There were a few months were Cursor were the scrappy upstarts, but now they’re a $200M/year company and they have $200M/year responsibilities. They can’t just wash their hands of it and pretend OpenVSX is a public service.
piker•3h ago
I sense a settlement agreement with strong non-disparagement terms is in the works here.
infecto•2h ago
Why in the open source world do goal posts always move? It’s a public open source service. Speaking purely on this vulnerability, it’s an extension listed in the OpenVSX ecosystem. Regardless if Cursor vetted all of these extensions or not I would still be incredibly hesitant like everyone should be.

Now do we need better solutions? Definitely and I do hope cursor will contribute towards it but I won’t hold them to it. They switched to OpenVSX less than a month ago, too soon to really say much at this point.

AIPedant•2h ago
I didn’t move any goalposts. Cursor set up the goalposts themselves by making a small volunteer-run service a critical component of their massive for-profit product. It’s greedy and irresponsible.
infecto•2h ago
“Open VSX is an open-source registry for VS Code extensions. It can be used by any development environment that supports such extensions.”

Sure sounds like you are moving goalposts around. Of course I hope Cursor contribute back but it’s been 20days and I am not an insider I have no idea what the plan is.

gametorch•4h ago
Cursor is off the hook in my system of ethics.

If you're running code without reading it, that's on you.

The exploiter is evil. Cursor has no culpability here.

vFunct•3h ago
Yah no that's not how it works. It's the system designer's responsibility to make sure you can run correct code without you reading it.

If you have to read it, then your system has already failed.

gametorch•3h ago
Yeah no that is how it works.

I want people to release cool software without the insane burden you describe. If they want to delegate that burden to users or ask them to pay for someone else to assume the burden, great.

I love Cursor. They haven't failed me. I'm not running arbitrary code and I suffer none of the consequences.

Furthermore, it probably literally says you're running random 3rd party code when you use extensions and Cursor is not liable. This is basic human responsibility 101. You are responsible for your own actions.

buttscicles•3h ago
You've audited the Cursor codebase then? Along with every other tool you use?
gametorch•3h ago
No.

I trust Cursor isn't trying to screw me.

I don't trust random 3rd party extensions. They might be trying to screw me. This is the exact reason why I don't touch npm.

I'm not prescribing a formal set of rules by which you should or shouldn't trust things. I'm just a reasonable person.

Cursor is an unrelated 3rd party to this situation, which is probably clearly described in their Terms of Service. Blaming them reeks of denying responsibility for your own actions. If you want Cursor to audit every 3rd party extension, they'd probably want you to pay them for it. Just like every commercially licensed Linux distro.

simmerup•2h ago
You understand that the extension was a copy of a genuine extension?

It was a mistake that he installed the duplicate fraudulent extension. For all we know he could have checked the intended extension code line by line, and then went on to install the trojan horse extension by accident.

gametorch•2h ago
I mean yeah I see what you're saying and that does add important nuance. It makes me more sympathetic to the user that got screwed.
Esophagus4•3h ago
This seems like a bad faith argument - the risky tools, yes, actually. I do audit them. Or at least poke around for someone who has.

It is easier than ever to do a DIY malware analysis on the tools you use.

“Hi Claude - you are a security researcher and malware analyst. Analyze the FooBar Chrome Browser extension / git repository I just downloaded for security threats and provide me a report on whether this is OK to use”

I know browser / IDE extensions are not usually audited and approved by the tool owner unless specifically noted otherwise. Even phone apps can sneak stuff in. So I am careful to only install things I trust or will audit myself or am willing to take the risk on.

vFunct•22m ago
You have to audit the risky tools because the system you are using was terribly designed.

Again, it's the system's responsibility to make sure you don't fail, not your responsibility.

ants_everywhere•3h ago
most of us haven't read the Linux kernel. Some of us even use closed operating systems like Mac OS, Windows or iOS. So this can't possibly be the right standard.

But it is true that certain types of developers will just download anything and integrate it into their development process. And it's also true that this would have been avoided by executing in a sandbox.

throwawayffffas•2h ago
> And it's also true that this would have been avoided by executing in a sandbox.

Until someone runs `cursor ~/.where_i_store_a_bunch_of_secrets` or maybe even `cursor ~/.bashrc`

gametorch•2h ago
It's not black and white.

It's reasonable to assume Cursor isn't trying to screw you over and you don't need to audit their code.

It's also reasonable to assume some of the arbitrary 3rd party extensions are trying to screw you over.

You don't have to be so rigid and extreme in your thinking. You can take the reasonable middle ground and make good guesses yourself.

throwawayffffas•3h ago
It's not their extension store.
infecto•4h ago
Even better. Malicious copy of extension found on OpenVSX. Then in the opening paragraph mention the tools using this registry, like cursor.
joelthelion•4h ago
So that guy used the same machine for development and holding 500,000$ in cryptos?
oc1•4h ago
Most people do.
joelthelion•3h ago
Most people don't hold 500k in cryptos.

Holding that much money on a machine that is not ultra secure is borderline insane.

djrj477dhsnv•1h ago
If it's less than 1% of your net worth, not that insane.

It's similar to how many crypto businesses will have a hot wallet with some fraction of their more secure cold wallet that they're okay losing.

LikesPwsh•4h ago
Cryptocurrency contracts are going to touch actual tokens at some point.

Even if the compromise wasn't on the developer's machine, it could have enabled a supply chain attack post-deployment.

walls•22m ago
There are test networks, and anyone with more than $500 in crypto should be using a hardware wallet at this point.
Jhsto•2h ago
Thought the same thing, could it be a false claim to get a nice headline thus clicks on your site?
darkwater•4h ago
You know you are in a cycle when some new software/paradigm brings new solutions and approaches while it forgets about basic stuff already implemented for ages by prior solutions. It's basically like an adolescent. I guess this is how we evolve?
EDEdDNEdDYFaN•4h ago
clickbait title

it wasn't even a cursor specific extension it was a vscode one. completely misleading

dylanjcastillo•4h ago
Seems VSCode quickly removed this extension from their marketplace: https://x.com/code/status/1943720372307665033?s=46
EZ-E•4h ago
Am I understanding right the extension was free to download code from internet and execute with enough rights to scan the user's disk? That is wild. Does this mean every company is one bad extension install away from having its entire codebase stolen or worse?

I naively assumed the extensions were 'sandboxed' to some degree.

delusional•4h ago
These systems rely on downloading and executing much more untrusted software than you could ever imagine. Please dig deeper into this for yourself, I think that's the only way for anyone to truly appreciate the mess we are getting ourselves into.
sshine•4h ago
There is no ACL system in place for VSCode extensions, no.

Any extension has full access to execute programs as the user.

Your operating system might have some security measures in place.

bravesoul2•4h ago
Even with just internet access an extension could upload your entire codebase. Git extensions for example need this level of access by design. How else could you set a different remote and push all refs:)
pjc50•3h ago
Browser extensions are sandboxed. Editor extensions not at all.
liveoneggs•3h ago
but the editor is a browser!
alternatex•2h ago
All the memory usage of a browser with the added benefit of less security :)
Sesse__•2h ago
This is the allure of shipping software with Electron; you get to use your familiar webdev platform, but with all those pesky security constraints gone. I mean, why else wouldn't you just have people use a web page? (OK, you also get easier access to the Start menu.)
jonathanlydall•2h ago
Being a developer of an Electron application myself, it's probably accurate to say that Electron is a NodeJS application with APIs for interacting with instances of web renderers which themselves use a fork of Chromium to render HTML content.
muzzle•3h ago
I also naively thought that IDE extensions where sandboxed until I worked myself on making extensions.

Well, it’s absolutely not and you can access the full filesystem. Which is handy if you are legit, but very permissive & much more a security threat than I imagined.

Be careful what extensions you install people :)

ceejayoz•3h ago
Being careful won’t save you from the attacks we see with Chrome extensions, where they get bought by a bad actor.
addandsubtract•3h ago
VSCode on MacOS asks me if it can access my Download/Documents/etc folder... and if I trust the files in directory X that I just opened. Yet, extensions can just bypass all those safeguards?
simonw•2h ago
I believe extensions inherit the permissions that the editor has already - so if you've given Cursor or VS Code permission to access a folder any extensions they run later can access it too.

I agree, this seems bad! Sandboxing is still a very weakly implemented craft for most applications, especially those that run extensions or plugins.

(I build a lot of software that runs plugins and has no sandboxing at all, and it really frustrates me. I'm constantly looking out for cross-platform Python-friendly sandboxing tech that might help with this in the future.)

TechDebtDevin•2h ago
Its called a docker container ;)
mistrial9•1h ago
> Sandboxing is still a very weakly implemented craft for most applications

voice of decades past -- sandboxing is very well known and deeply implemented in many aspects of ordinary daily computing; sandboxing is endlessly difficult and can be mis-applied; people who want to break into things and steal and wreak havoc ruin software environments for everyone else.

octopoc•33m ago
I’m monitoring this area as well. You’ve probably run across these already but extism, a polyglot plugin framework, can be hosted in Python[1] and has evolving support for writing plugins in Python [2]. Another option is container2wasm[3].

I actually tried running clickhouse in container2wasm and it crashed because it only had one CPU core, so YMMV—although that shouldn’t be a problem for Python (or any code custom built for your plugin framework).

For me, I want to avoid separate processes. I definitely want to avoid separate VMs.

[1] https://github.com/extism/python-sdk

[2] https://github.com/extism/python-pdk

[3] https://github.com/container2wasm/container2wasm

postalcoder•2h ago
Definitely install something like little snitch and keep an eye out for the requests that come out of vscode.

I’ve become very paranoid with extensions as of late. It’s great that llms have gotten so good and banging out personal tools. I am using a few home grown extensions in my own setup.

IshKebab•3h ago
> Does this mean every company is one bad extension install away from having its entire codebase stolen or worse?

Yes.

> I naively assumed the extensions were 'sandboxed' to some degree.

No. This is fairly obvious if you have used more than a few extensions - often they'll ask you to download and install binaries.

ants_everywhere•3h ago
> Am I understanding right the extension was free to download code from internet and execute with enough rights to scan the user's disk?

I honestly thought that was how the Javacsript and Python ecosystems worked? And surely many others.

cosiiine•2h ago
Zed for example will start crawling your home directory and all children if you don’t have a project open. Documents, downloads, etc all uploaded.
notpushkin•1h ago
Source?
myaccountonhn•10m ago
See also: the millions of npm packages that get installed are one bad actor away from a disaster.
lmz•4h ago
It's nice how they still respected copyright by not copying actual useful code out of the original extension.
viraptor•4h ago
I don't get why they did that to be honest. Just copying the functionality from the other extension would let them catch so many more people.
jowea•3h ago
Would it trigger a plagiarism detector somewhere?
dylanjcastillo•4h ago
How do you stay safe from this kind of attacks?
Velorivox•4h ago
Easy: stay away from crypto.
pshirshov•4h ago
Use hardware wallets, avoid running Windows, hash-pin your extensions with Nix and carefully review them in advance.
Asmod4n•3h ago
The System you keep your wallet on must be secured like a bank. Because the app can do nearly everything a bank can do (except refunds)
ivanjermakov•4h ago
Dupe: https://news.ycombinator.com/item?id=44565994
pshirshov•4h ago
But this is not about Cursor. It's a supply chain attack, and a Windows machine running a software wallet. A hardware wallet would make this impossible.
bravesoul2•4h ago
Hardware wallet makes this less likely. Yes.
TrackerFF•4h ago
Should be trivial to search for links inside the code for the extensions. Though attackers can obfuscate those trivially too.
voidUpdate•3h ago
I'm surprised that you can still get .su (soviet union) domains. I'd have thought someone would have said that you can't buy them anymore
poly2it•3h ago
How much are you missing out on if you just ban *.su connections on your device?
voidUpdate•3h ago
According to wikipedia, organisations with roots in the soviet union, the Donetsk People's Republic, white supremacist websites and cybercrime. So you can probably safely block it unless you're into those kinds of things.

EDIT: also student's unions apparently, which kinda makes sense

nubinetwork•3h ago
Russia doesn't give a shit. https://en.wikipedia.org/wiki/.su
nottorp•3h ago
Can’t blame the LLM for once… clickbait title.
vultour•3h ago
> The developer was well aware of the cybersecurity risks associated with crypto transactions, so he was vigilant and carefully reviewed his every step while working online.

Uses Cursor. Downloads random extensions.

Gigachad•3h ago
Tbh it’s literally impossible to use your computer normally and be vigilant enough to protect crypto. No one could ever properly audit everything they run.
dist-epoch•3h ago
It is possible.

Brand new laptop, stock Ubuntu on it, nothing else. If you don't want to go the Qubes OS way.

weird-eye-issue•3h ago
You interpreted "normally" in a very interesting way.
throwawayffffas•3h ago
Using qubes os is a "normal" way to use a computer.
djtango•2h ago
If you have more than high 5 figures of money lying around, should you be co-mingling it with your everyday activities?

I wouldn't feel particularly comfortable even having 5 figures of tradfi cash lying around in my house let alone carrying it on my laptop where someone could steal my bag or machine and that's before it is connected

tomrod•1h ago
"Common" != "Normal".
throw101010•3h ago
That's the reason why Hardware wallets exist. They aren't the panacea, but they drastically increase the separation of your keys from the Internet. Some (like ColdCard) do not ever need to touch an online computer directly.

For small amounts all these mobile/addons/desktop software are fine (with minimum caution like avoiding reckless behavior described in the OP). For larger amounts cold storage (of which hardware wallet are the easiest to deploy) will protect your funds.

When you put cash in your physical wallet you assume that this could be lost to a robber in the streets, with little to no recourse. You wouldn't put all your belongings in a big bag you would carry everywhere you travel, or if you did you would increase your security proportionally to this increased risk... if you don't, nobody would shed a tear over your potential losses.

Not sure how this is different with crypto, I guess people assume everything is safe by default because it has no physical form, despite the 20 warnings and security reminders they get when they setup any crypto wallets.

nubb•3h ago
500k in seed.txt on a dev box is criminally irresponsible
ratg13•3h ago
In this case it's literally as simple as not developing anything while playing around with a live wallet that has hundreds of thousands of dollars in it.

It's like trying to do vehicle maintenance while your car is running.

It might be technically possible.. but why would you ever do that?

rwmj•3h ago
Isn't the analogy more like: going shopping, while you have $500,000 in gold in the trunk of your car.
OkPin•3h ago
This incident really underscores how AI-powered dev tools, which rely on open-source extension registries like Open VSX, can be weaponized via supply chain abuse. A $500k crypto heist via a bogus “syntax highlighter” signals a scary maturity in these attacks.

Ranking manipulation, using recency and inflated download counts, to outrank the legitimate Solidity package is a clever exploit of how developers search. It makes me wonder: should IDEs start validating package authorship or offer signed extensions as a default?

Also, the fact that this happened on a freshly imaged system with no antivirus suggests we need to rethink trust models for extension marketplaces. Not just for crypto devs, but for any industry sensitive to code integrity.

oc1•3h ago
We're getting back to the old age of antivirus software. Can't wait to install Norton or Kaspersky on my Mac M5. Also good time to start your antivirus ai startup.
OldfieldFund•6m ago
Can you sell me your Mac M5, time traveller?
rubymamis•3h ago
How's the extension able to run powershell commands with no warnings or permission requests? I assume this is type of attack is not possible on macOS?
rightbyte•3h ago
Why do we pretend executing malicious code is sandboxable?

It is a social problem not a technical problem.

nubinetwork•3h ago
Make it a bash script, and it'll run almost anywhere...
rubymamis•3h ago
Once the equivalent of "ScreenConnect" is downloaded and run on macOS, I assume Gatekeeper will not let it run?
oefrha•2h ago
Wrong, bash scripts can pop up a series of permission prompts on macOS if you do a full disk scan. They’re only suppressed when directly run from an application like Terminal that’s already been given full disk access or developer tools permission. In fact, sometimes the syscall just silently fails with no permission popup. For instance I have this python script calling an HTTP endpoint on LAN that when run within tmux would sometimes inexplicably fail with no route to host error because it doesn’t have local network scan permission, there’s no permission prompt, and the only solution is to restart the tmux server.
notpushkin•1h ago
> from an application like Terminal that’s already been given full disk access or developer tools permission

Most likely that includes your IDE?

oefrha•55m ago
Not in my case. I only give Terminal and iTerm “Developer Tools” permission. Cursor shows up under “Full Disk Access” with a toggle so it may have requested the permission at some point, but I have it on disable; I don’t see why it needs to reach out of directories I actively open. (And VSCode which I used for years doesn’t even show up there.)

Disclaimer: I’m not sure whether Cursor inherits iTerm’s permissions when launched from CLI. The TCC system is pretty mysterious to me in general.

rs186•3h ago
This is basically RCE that can happen on any OS.
arnaudsm•3h ago
Context : Cursor, despite raising $900M, is a vscode fork that uses the open-vsx extension registry. It is maintained by european volunteers at a non-profit, and does not have the resources to check for supply-chain attacks like this.

Freeloading on (and blaming) volunteer infrastructure is irresponsible, especially when you have so much funding.

Cthulhu_•3h ago
Cursor, Microsoft, and all the major players in this space should invest heavily in a managed dependency / plugin service, also for the huge amount of nodeJS package. They need a review, scan, certification and warranty program.

Apple did it 15 years ago, time for the rest to catch up. They can turn it into a business by offering enterprise subscriptions for higher guarantees or a warranty.

blibble•3h ago
the entire AI industry is based on mass parasitism of art, music, articles, newspapers, books and open source code

why would they start investing now when they can just continue to plunder the commons uninterrupted?

spwa4•2h ago
That's the more general issue, isn't it? Users demand software, guarantees, ... and refuse to pay for it.

That goes for the AI industry itself, but equally for everyone using it.

Microsoft won when it found a way to extract software fees as a tax from hardware manufacturers.

FANG won when it found a way to extract software writing and hosting fees from advertisers, effectively making it a tax on everything you buy.

Both of these (Operating systems and basic cloud services like email hosting) can be done for a lot cheaper if they were paid for by end users, but those just won't pay. In fact, for a while they were paid by end users (microsoft did that, gmx.net, infomaniak, ...). Then everyone switched to "free" and here we are.

And we all know there's no way back, so what's the point discussing it? We all know most people will just not have email or web search if they had to pay even 5$ per year to get it, and I seem to recall an article stating Google effectively earns over $100 per year per account.

Reality is: give it another 2 years and the "art, music, articles, newspapers, books and open source code" industries will reach absolutely nobody except through AI providers. That could be avoided if every creator paid $1 per year to have free infrastructure for their services, but there's no way in hell they will do that ... so here we are. In 2 years instead they'll pay $1000 every time they want someone to actually look at their art.

And yet, the situation with banking services is far worse, imho. So bad, in fact, that even charging $0.01 per year for internet services would be a nonstarter.

arnaudsm•3h ago
Microsoft claims their team banned the extension in "2 seconds" https://x.com/code/status/1943720372307665033?s=46

Concerning Apple, their review process is so hard and unjust, I've seen startups give up apps after months of work just because of that.

Maybe sandboxing and runtime-level permissions are a better compromise?

manojlds•3h ago
Microsoft (claims) does that already. Their pitch is for people to use the main VSCode marketplace.
rcxdude•3h ago
Which you are only allowed to do if you use Microsoft's build of VSCode. The ecosystem of that is deliberately closed off.
simmerup•2h ago
This event kind of makes that seem justified, no?
notpushkin•2h ago
Not really, no.
ants_everywhere•3h ago
> Freeloading on (and blaming) volunteer infrastructure is irresponsible, especially when you have so much funding.

I agree. If you're going to fork vscode, it's not that much harder to add a sandbox. Even a docker container would be better than nothing.

xinayder•3h ago
How different is Cursor to VSCodium?

Nonetheless, I think this is more a vulnerability in the Open VSIX registry side, than Cursor AI. If anything, the forks and VS Code should block/sandbox extensions by default, or have a granular permission system to allow users to consciously choose whether to allow an extension to use network resources or not.

arnaudsm•3h ago
Cursor is a paid product and a company, VSCodium is an open-source project running on volunteers.
xinayder•3h ago
So the $900M product runs on volunteer-ran infrastructure, without giving anything back to the Open VSX registry?

Seems like software development industry in a nutshell: multi-millionaire companies freeloading on volunteer work :)

notpushkin•2h ago
Open VSX is actually ran by the Eclipse Foundation, but yeah, apparently Cursor doesn’t support them. :’)
mrkramer•3h ago
I'm always anxious when I download npm packages or when I pip Python packages...tbh it's a gamble because there are so many supply chain attacks and/or malicious developers.
samsk•3h ago
Thats why I always develop on a per customer mini VM via VSCode ssh remoting or similar, and projects are usually runned via docker-compose or devcontainers.
meander_water•3h ago
There's actually a new setting in vscode (from Dec 24) to configure a whitelist for extensions that are allowed to be installed on a user's machine [0]. It's not foolproof, but it probably helps to prevent common supply chain attacks. I wonder if this could be used in cursor too.

[0] https://code.visualstudio.com/docs/setup/enterprise#_configu...

braggerxyz•2h ago
Some crypto bro got scammed while being involed in some AI shit? How ironic.

Yet, the extension dilemma is also utterly shit. That's why I stay far away from "VSCode and friends"

throw7484485•2h ago
Downloading random code from internet is just normal development on Mac. Brew, npm and other sorts of "package managers".

I have code, passwords and certificates separated in virtual machines, even IDE GUI app is virtualized, and has no rights to access GitHub, internet or filesystem directly.

But I get a lot of flack from coworkers. They say it is unintuitive and uses x86 CPU which is uncool. Mac has no reasonable VM software or secure containers!

OldfieldFund•7m ago
Mac has also much fewer Trojans/Stealers than Windows as far as I understand.
signaleleven•31m ago
Somewhat humorously, my company displayed an IT warning telling me that I can't visit the website in question because it's in Russia. I probably set off some kind of alarm somewhere.

I do use Cursor at work and I have various extensions installed.