Skip to main content

“Vibe Hacking”: Abusing Developer Trust in Cursor and VS Code Remote Development

Medium
Published: Mon Aug 18 2025 (08/18/2025, 15:51:45 UTC)
Source: Reddit NetSec

Description

In a recent red team engagement, the client's attack surface was so well-defended that after months of effort, the only system we managed to compromise was a lone server, which was apparently isolated from the rest of the network. Or so we thought. One developer had been using that server for remote development with Cursor. This setup is becoming increasingly popular: developers run AI agents remotely to protect their local machines. But when we dug deeper into how Cursor works, we discovered something unsettling. By pivoting through the remote server, we could actually compromise the developer's local machine. This wasn't a Cursor-specific flaw. The root cause lies in the Remote-SSH extension that Cursor inherits directly from VS Code. Which means the attack path we uncovered could extend across the entire VS Code remote development ecosystem, putting any developer who connects to an untrusted server at risk. For the details, check out our [blog post](https://blog.calif.io/p/vibe-hacking-abusing-developer-trust). Comments are welcome! If you enjoy this kind of work, [we're hiring](https://calif.io/jobs)!

Technical Details

Source Type
reddit
Subreddit
netsec
Reddit Score
5
Discussion Level
minimal
Content Source
reddit_link_post
Domain
blog.calif.io
Newsworthiness Assessment
{"score":23.5,"reasons":["external_link","newsworthy_keywords:ttps","non_newsworthy_keywords:job,vs,check out our","established_author","recent_news"],"isNewsworthy":true,"foundNewsworthy":["ttps"],"foundNonNewsworthy":["job","vs","check out our"]}
Has External Source
true
Trusted Domain
false

Threat ID: 68a35cb4ad5a09ad00b0b604

Added to database: 8/18/2025, 5:02:44 PM

Last updated: 8/18/2025, 5:02:44 PM

Views: 1

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats