JR
cursor-agent-v0.4.2 v0.4.2
Publisher: Unknown Unverified
github-download
Last seen: 3 hours ago · Active on 47 of 247 endpoints
Team owner: Engineering · sarah.chen
First seen: March 4, 2025 · 48 days at current risk level
Risk Score
Provenance 85
Behavior 74
CVE 12
AI-Generated Risk Summary

cursor-agent-v0.4.2 is a sub-binary of the Cursor AI coding assistant, downloaded directly from GitHub without going through an official package registry. It carries no verified publisher signature, making it impossible to confirm its origin or integrity through standard channels. This binary has been observed accessing AWS credential files (~/.aws/credentials), SSH private keys (~/.ssh/id_rsa), and browser session token caches across 47 Finova endpoints — access patterns that extend well beyond what a coding assistant requires. While Cursor AI is a widely-used legitimate development tool, this specific sub-binary was introduced in version 0.42 and its file access behavior matches previously documented patterns in supply chain compromise incidents. Our behavioral scan flagged 2 non-conclusive indicators. Immediate recommendation: apply zero trust file control to restrict this binary to its working directory, and investigate the 3 external IP addresses it contacted outside Cursor's known infrastructure.

Risk Breakdown
Provenance Risk
85
No verified publisher, downloaded via github-download, not from official registry
Behavior Risk
74
Accesses credentials, SSH keys, and browser tokens beyond expected scope
CVE Risk
12
No CVE records (binary not in any CVE database — itself a risk signal)
Behavioral Timeline
First detected Mar 4 — 7 weeks ago

Binary appeared on 3 endpoints via Cursor update. No file access anomalies at first observed.

Access pattern change Mar 11 — 6 weeks ago

Binary began reading ~/.aws/credentials. Spread to 47 endpoints after Cursor v0.42 auto-update.

External contacts detected Mar 28 — 3 weeks ago

3 outbound connections to IPs outside Cursor's known infrastructure. Two IPs on threat intel watchlists.

ShieldOps flagged Apr 15 — 6 days ago

Risk score crossed threshold (78/100). Added to Approval Queue. Zero trust file control recommended.

Awaiting decision Now

Monitoring continues. Access paths partially restricted pending full policy decision.

Top Sensitive Paths Accessed
Path Access Type Count Last Accessed
~/.aws/credentials Read 847 2 hours ago
~/.ssh/id_rsa Read 203 5 hours ago
~/Library/Application Support/Google/Chrome/Default/Cookies Read 156 1 day ago
~/.ssh/config Read 89 3 hours ago
/etc/hosts Read 12 2 days ago