{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreifbuk5lukcgqbd5hkctqzclplhj4h3gqww7kcr6ksnycc2bdbaysy",
"uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mkrhm4fecxy2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreifudednatntscoxna27cavpbsqm5cr5s6k2f56vrer2ajlojnzg6q"
},
"mimeType": "image/webp",
"size": 15420
},
"path": "/cursor-ai-coding-agent-flaw-lets-malicious-repositories-run-code-on-developer-machines/",
"publishedAt": "2026-04-30T16:25:07.000Z",
"site": "https://vpncentral.com",
"tags": [
"News",
"Cursor AI coding agent flaw lets malicious repositories run code on developer machines",
"VPN Central"
],
"textContent": "A Cursor vulnerability tracked as CVE-2026-26268 can let attackers run code on a developer’s machine through a malicious repository. The issue affects Cursor versions before 2.5 and has been fixed in version 2.5. The flaw matters because developers often clone public repositories as part of normal work. In this case, a malicious repository can abuse […]\n\nThe post Cursor AI coding agent flaw lets malicious repositories run code on developer machines appeared first on VPN Central.",
"title": "Cursor AI coding agent flaw lets malicious repositories run code on developer machines"
}