I just got this from 5 different people. It’s claimed to be an open source xbow. Go try auto-pentest your apps. Security open source startups are back!
Go @Strixgithub.com/usestrix/strix
It’s fascinating to watch how someone writes an opinion piece on a topic, say “the collapse of OpenAI”, only for two thousand others to release influencer posts on it the next two weeks as fact.
Ransomware has appeared in the VS Marketplace and makes me worry. Clearly created through AI, it makes many mistakes like including decryption tools in extension. If this makes it into the marketplace through, what impact would anything more sophisticated cause?
secureannex.com/blog/ransomv…
MCP servers, extensions, and even simple prompts and rules introduce third-party risks that push the CI/CD boundaries and extend the organizational perimeter to the developer’s workstation.
Impact:
- Interpreter-level execution can directly call the file system and native APIs
- An attacker can inject JavaScript into the running IDE, fully controlling the UI.
We demonstrate how an attacker can:
- Gain full file-system access
- Modify or replace installed extensions
- Persist code that reattaches after restart.
Our purpose is to deep dive into these attacks, understand why they continue to work, and suggest defensive approaches. Especially when it comes to cyber defense and AppSec (aside for Knostic wink wink), the industry doesn’t yet have capabilities in this realm.
A JavaScript injection attack on Cursor, facilitated by a malicious extension, can take over the IDE and the developer workstation.🧵🧵knostic.ai/blog/demonstratin…
Holy wow Batman. We live in the future. I try and stay up to date, but it’s not trivial. Have you seen any recent development that stopped you cold?
popularmechanics.com/science…
LinkedIn post by @gadievron about an ongoing attack campaign targeting AI coding agents such as Cursor and Windsurf, through extensions in the Open VSX marketplace
linkedin.com/posts/gadievron…