Loading cryptocurrency prices...

CopyPasta exploit targets Cursor, risks Coinbase codebases!!

  • HiddenLayer disclosed a new “CopyPasta License Attack” that hides instructions in common project files to trick AI coding assistants.
  • The exploit targets tools like Cursor, which Coinbase said in August was used widely by its engineers.
  • The attack embeds hidden markdown comments in files such as LICENSE.txt so the model will preserve and replicate the instructions across files.
  • Coinbase CEO Brian Armstrong said about 40% of daily code is AI-generated and aims for more than 50% by October.
  • Researchers warn organizations to scan for hidden comments and treat all untrusted inputs to large language models as potentially malicious.

Cybersecurity firm HiddenLayer disclosed Thursday that attackers can use a method called a “CopyPasta License Attack” to insert hidden instructions into common developer files and trick AI coding assistants into spreading them across a codebase. The attack relies on AI tools treating certain files as authoritative and preserving their contents when modifying code.

- Advertisement -

The disclosure showed the technique primarily affects tools like Cursor, which Coinbase said in August was among the AI tools used by its engineers. Brian Armstrong wrote on Twitter that “~40% of daily code written at Coinbase is AI-generated. I want to get it to >50% by October.” He added AI work is concentrated in user interfaces and non-sensitive backends, with “complex and system-critical systems” adopting more slowly.

HiddenLayer’s report described embedding malicious payloads inside hidden markdown comments in files such as LICENSE.txt so the assistant treats those comments as license instructions and preserves them when editing. Hidden markdown comments are pieces of text in files that are not normally visible in rendered documentation; prompt injection is when input manipulates an AI model into following hidden instructions.

Researchers demonstrated how Cursor could be tricked into adding backdoors, siphoning sensitive data, or running resource-draining commands. HiddenLayer said, “Injected code could stage a backdoor, silently exfiltrate sensitive data or manipulate critical files.” The payloads can evade standard Malware detection because they appear as harmless documentation.

The technique broadens earlier worm concepts such as Morris II; IBM has written about those prior email-agent attacks here. HiddenLayer warned, “All untrusted data entering LLM contexts should be treated as potentially malicious.”

- Advertisement -

Security teams now urge scanning files for hidden comments and manually reviewing all AI-generated changes. (CoinDesk has reached out to Coinbase for comment.)

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Crypto Liquidations Wipe $646M as Bitcoin, Ether Prices Fall

Nearly $646 million in leveraged crypto positions were liquidated across major exchanges early Monday.Long...

Tomiris APT Shifts to Telegram, Discord for Stealthy Cyberattacks

The threat actor Tomiris targets government and intergovernmental organizations in Russia and Central Asia.New...

Lawmakers, White House Push Crypto Rules Ahead of Year-End Vote

Congress is preparing for several crypto policy events and potential legislation in December 2025.Senate...

North Korea’s Lazarus Group Leads Spear Phishing Crypto Attacks

Lazarus Group led spear phishing attacks to steal funds across multiple sectors, including cryptocurrency,...

Bitcoin and Ether Drop Over 3% Amid Yearn Finance Hack Panic

Bitcoin and Ethereum prices dropped early Monday amid concerns over a security breach at...
- Advertisement -

Must Read

A Beginner’s Guide To Cryptocurrency Mining

Cryptocurrency is considered one of the most popular forms of financial assets today. Many of these digital assets operate within blockchain technology which works...