PoC Exploits

Exploit Cursor Agents to create persistent, distributed threats

Simply opening a folder can give an attacker a foothold into all the code bases a developer maintains.