Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> be tested against popular LLMs, perhaps work by tricking Cursor and similar tools into installing the malware, without the user running anything themselves

My sense is that the attack isn't nearly as sophisticated as it looks, and the attackers out there aren't really thinking about things on this level — yet.

> Hide the shellcode in an `npm` dependency

It would have to be hidden specifically in a post-install script or similar. Which presumably isn't any harder, but.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: