Hacker News new | past | comments | ask | show | jobs | submit login

Supply chain attacks, I'd reckon.

Get malicious code stuffed into Cursor (or similar)-built applications -- doesn't even have to fail static scanning, just got to open the door.

Sort of like the xz debacle.






It's even better if you have anything automated executing your tests and whatnot (like popular VSCode plugins showing a nice graphical view of which errors arise from where through your local repo). You could own a developer's machine before they had the time to vet the offending code.

Yeah esp Cursor YOLO mode (auto write code and run commands) is getting very popular

https://forum.cursor.com/t/yolo-mode-is-amazing/36262


What's that game when you take damage it rm - f random files in your filesystem?

There's two games similar to that that I know of (though you're probably thinking of the first):

* https://en.wikipedia.org/wiki/Lose/Lose - Each alien represents a file on your computer. If you kill an alien, the game permanently deletes the file associated with it.

* https://psdoom.sourceforge.net/ - a hack of Doom where each monster represents a running process. Kill the monster, kill(1) the process.


That's called not having a backup of your physical storage medium: when it takes damage, files get gone!

I’d love to know this game if you remember please share!

sibling mentioned psdoom and "Lose", i've heard of both, but i was thinking of "Lose" specifically.

Yeah that would be the most obvious "real" exploit (on the code generation side)



Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: