Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at LayerX
First seen on infosecurity-magazine.com
Jump to article: www.infosecurity-magazine.com/news/cursor-extension-flaw-exposes-api/
![]()
Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at LayerX
First seen on infosecurity-magazine.com
Jump to article: www.infosecurity-magazine.com/news/cursor-extension-flaw-exposes-api/
![]()