Blog

Roy Paz Published - April 28, 2026

CursorJacking: Every Cursor User Is Vulnerable to API Key Theft by Rogue Extensions

Cursor doesn’t store API keys in protected storage, meaning any extension can access them. Cursor knew about this vulnerability but didn’t fix it. Executive Summary LayerX security researchers have found that any extension of the popular AI development tool Cursor can access the developer’s API keys and session tokens, leading to full credential compromise, with […]

Learn More
CursorJacking: Every Cursor User Is Vulnerable to API Key Theft by Rogue Extensions