Cursor, Windsurf & Google Antigravity IDEs Linked to Malicious Extension Exposure

Cursor, Windsurf & Google Antigravity IDEs Linked to Malicious Extension Exposure

A critical supply chain vulnerability has been discovered affecting millions of developers using popular AI-powered IDEs, including Cursor, Windsurf, and Google Antigravity.

Security researchers revealed that these coding environments were actively recommending non-existent extensions, allowing potential attackers to upload malware that users would unthinkingly install.

Malware installed extensions

The issue stems from how these tools were built. Cursor, Windsurf, and Antigravity are all “forks” (modified versions) of Microsoft’s VS Code.

However, due to licensing restrictions, they cannot use the official Microsoft Extension Marketplace. Instead, they rely on an open-source alternative called OpenVSX.

When these companies copied VS Code, they accidentally inherited a configuration file essentially a “shopping list” of recommended extensions.

placeholder extensions on Open VSX
placeholder extensions on Open VSX

These recommendations are triggered by specific actions, such as opening a generic file type or installing software such as PostgreSQL.

Cursor, Windsurf & Google Antigravity IDEs Linked to Malicious Extension Exposure
Supply CHain Attack

Many of the “official” Microsoft extensions listed in the config file were not available on the OpenVSX marketplace.

The Exploit

This created a massive security gap. Because the extension names were unclaimed on OpenVSX, anyone could register them. An attacker could upload a malicious file using one of these official-sounding names.

When a developer used the IDE, the system would see the gap and automatically prompt the user: “Recommendation: Install this extension.”

Trusting their IDE, the user would click install, effectively handing over full system access to the attacker.

Google Antigravity recommending potentially malicious extensions
Google Antigravity recommending potentially malicious extensions

This could lead to the theft of SSH keys, AWS credentials, and source code, without any phishing required, as reported by Koi AI.

To prove the danger, researchers from Koi claimed these vulnerable namespaces first. They uploaded harmless “placeholder” extensions.

The results were alarming: over 1,000 developers installed these empty files simply because their IDE recommended them.

  • Cursor: Acknowledged and fixed the issue on December 1, 2025.
  • Google: Initially rejected the report as “Won’t Fix,” but later accepted the vulnerability and rolled out fixes by January 1, 2026.
  • Windsurf: Has reportedly not responded to the disclosure.

The Eclipse Foundation, which manages OpenVSX, has since worked to verify namespaces and remove unauthorized contributors to prevent further abuse.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link