Ethical Hacking News
Snyk, a leading developer security company, has found itself at the center of controversy after allegations emerged that it deployed "malicious" packages targeting Cursor, an AI code editor company. The incident raises questions about cybersecurity and the potential risks associated with open-source software.
Snyk, a developer security company, has been accused of deploying "malicious" packages targeting Cursor, an AI code editor company. A researcher claimed to have discovered three packages that collected system data and sent it to an attacker-controlled web service when installed. The packages were named after Cursor's bundled extensions, leading some to speculate about Snyk's intentions. Snyk has since removed the packages from NPM and apologized, but both companies have yet to respond to questions. The incident highlights the importance of thorough testing and evaluation of open-source software to prevent security risks.
Snyk, a leading developer security company, has found itself at the center of controversy after allegations emerged that it deployed "malicious" packages targeting Cursor, an AI code editor company. The incident has raised concerns about cybersecurity and the potential risks associated with open-source software.
According to Paul McCarty, a security researcher at SourceCodeRed.com, he made the discovery during a malicious package detection routine. He claimed that a user named "sn4k-s3c" had uploaded three packages that were later tagged as malicious and named in a way that seemingly targeted Cursor: cursor-retrieval, cursor-always-local, and cursor-shadow-workspace. The packages, when installed, would collect data about the system and send it to an attacker-controlled web service.
The cursor-shadow-workspace package, for example, would capture outputs of an env command, exposing secrets such as GitHub credentials, AWS keys, and NPM tokens. McCarty warned that if the package was run, these secrets would be compromised, putting sensitive information at risk.
Snyk has since removed the packages from NPM, the open-source JavaScript package library. However, before they were removed, the metadata indicated that an individual using a Snyk.io email address authored the malicious packages. The Register asked Snyk and Cursor for additional information, but both companies have yet to respond.
Conspiracist theories have emerged on social media platforms, with some speculating that Snyk's actions were not malicious in nature, but rather a test or an attempt to raise awareness about a possible dependency confusion vulnerability. Arvid Lunnemark, co-founder of Anysphere – the company behind Cursor – shed some light on what happened behind the scenes.
Lunnemark stated that suggestions it was an error on NPM's side could not be correct given that Snyk's packages were named after Cursor's bundled extensions, which are not packaged or uploaded to a registry. Lunnemark also clarified that Cursor did not hire Snyk to carry out any kind of security audit.
"We did not hire Snyk, but we reached out to them after seeing this and they apologized. We did not get any confirmation of what exactly they were trying to do here," Lunnemark said in a comment on the Hacker News thread.
Danny Allan, chief technology officer at Snyk, later provided a statement explaining that Snyk Research Labs regularly contributes back to the community with testing and research of common software packages. The particular research into Cursor was not intended to be malicious and included Snyk Research Labs and the contact information of the researcher. However, Snyk does follow a responsible disclosure policy and would have immediately followed up with anyone who had picked up on the package if they had done so.
The incident has raised questions about cybersecurity and the potential risks associated with open-source software. While it is possible that there was no foul play involved, the fact that Snyk's packages were named after Cursor's bundled extensions has led some to speculate about the intentions behind the actions.
As the situation continues to unfold, it is essential for developers to remain vigilant and take steps to protect themselves against potential security risks. The incident serves as a reminder of the importance of thorough testing and evaluation of open-source software before integrating it into production environments.
Related Information:
https://go.theregister.com/feed/www.theregister.com/2025/01/14/snyk_npm_deployment_removed/
Published: Tue Jan 14 09:46:46 2025 by llama3.2 3B Q4_K_M