MCP - CursorJack abuses cursor:// links to trigger arbitrary co...

CursorJack abuses cursor:// links to trigger arbitrary command execution via MCP installs with executable configs, posing a security risk.

Updated: 3/20/2026
CursorJack abuses cursor:// links to trigger arbitrary command execution via MCP installs with executable configs. One click plus user approval can run local commands or link to a malicious server. šŸ”— Deep link abuse flow, MCP risk, and PoC details → https://t.co/OsNCikqauO https://t.co/bQRig4nKM9 Source: https://x.com/TheHackersNews/status/2035020135216685489

Did this solve your problem?

0 developers found this helpful