Exploit Cursor Agents to create persistent, distributed threats Simply opening a folder can give an attacker a foothold into all the code bases a developer maintains.