“Vibe Hacking”: Abusing Developer Trust in Cursor and VS Code Remote Development
In a recent red team engagement, the client's attack surface was so well-defended that after months of effort, the only system we managed to compromise was a lone server, which was apparently isolated from the rest of the network. Or so we thought. One developer had been using that server for remote development with Cursor. This setup is becoming increasingly popular: developers run AI agents remotely to protect their local machines. But when we dug deeper into how Cursor works, we discovered something unsettling. By pivoting through the remote server, we could actually compromise the developer's local machine. This wasn't a Cursor-specific flaw. The root cause lies in the Remote-SSH extension that Cursor inherits directly from VS Code. Which means the attack path we uncovered could extend across the entire VS Code remote development ecosystem, putting any developer who connects to an untrusted server at risk. For the details, check out our [blog post](https://blog.calif.io/p/vibe-hacking-abusing-developer-trust). Comments are welcome! If you enjoy this kind of work, [we're hiring](https://calif.io/jobs)!
“Vibe Hacking”: Abusing Developer Trust in Cursor and VS Code Remote Development
Description
In a recent red team engagement, the client's attack surface was so well-defended that after months of effort, the only system we managed to compromise was a lone server, which was apparently isolated from the rest of the network. Or so we thought. One developer had been using that server for remote development with Cursor. This setup is becoming increasingly popular: developers run AI agents remotely to protect their local machines. But when we dug deeper into how Cursor works, we discovered something unsettling. By pivoting through the remote server, we could actually compromise the developer's local machine. This wasn't a Cursor-specific flaw. The root cause lies in the Remote-SSH extension that Cursor inherits directly from VS Code. Which means the attack path we uncovered could extend across the entire VS Code remote development ecosystem, putting any developer who connects to an untrusted server at risk. For the details, check out our [blog post](https://blog.calif.io/p/vibe-hacking-abusing-developer-trust). Comments are welcome! If you enjoy this kind of work, [we're hiring](https://calif.io/jobs)!
Technical Details
- Source Type
- Subreddit
- netsec
- Reddit Score
- 5
- Discussion Level
- minimal
- Content Source
- reddit_link_post
- Domain
- blog.calif.io
- Newsworthiness Assessment
- {"score":23.5,"reasons":["external_link","newsworthy_keywords:ttps","non_newsworthy_keywords:job,vs,check out our","established_author","recent_news"],"isNewsworthy":true,"foundNewsworthy":["ttps"],"foundNonNewsworthy":["job","vs","check out our"]}
- Has External Source
- true
- Trusted Domain
- false
Threat ID: 68a35cb4ad5a09ad00b0b604
Added to database: 8/18/2025, 5:02:44 PM
Last updated: 8/18/2025, 5:02:44 PM
Views: 1
Related Threats
Supply Chain Risk in Python: Termcolor and Colorama Explained
MediumManpower Data Breach Hits 144,000 users, Workday Confirms 3rd-Party CRM Breach
HighIntel Outside: Hacking every Intel employee and various internal websites
MediumMicrosoft 365 Direct Send Abuse: Phishing Risks & Security Recommendations
MediumEavesdropping on Phone Conversations Through Vibrations - Schneier on Security
MediumActions
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.