> be tested against popular LLMs, perhaps work by tricking Cursor and similar tools into installing the malware, without the user running anything themselves
My sense is that the attack isn't nearly as sophisticated as it looks, and the attackers out there aren't really thinking about things on this level — yet.
> Hide the shellcode in an `npm` dependency
It would have to be hidden specifically in a post-install script or similar. Which presumably isn't any harder, but.
My sense is that the attack isn't nearly as sophisticated as it looks, and the attackers out there aren't really thinking about things on this level — yet.
> Hide the shellcode in an `npm` dependency
It would have to be hidden specifically in a post-install script or similar. Which presumably isn't any harder, but.