Credential ExfilPublished Apr 10, 2026

Obfuscated base64+exec credential grab in .cursorrules

CriticalAARM tierConfirmed
Seen63times across7customers
jiffy-ti-2026-000007

Summary

.cursorrules files with base64-encoded Python payloads that decode and exec a credential-harvesting routine. Rule appears innocuous until the encoded block is extracted.

Severity & confidence

Severity
Critical

Critical

Active exploitation in the wild, high blast radius, or direct data exfiltration vector. Treat as an urgent remediation target; quarantine affected artifacts immediately.

Confidence
Confirmed

Confirmed

Observed directly by Jiffy scanners or validated by multiple independent sources. Indicators are reliable enough to drive automated action.

Indicators

Observed patterns and artifacts associated with this entry. Each indicator can be copied into your detection stack or SIEM.

  • base64\.b64decode\(.{0,120}exec
  • codecs\.decode\(.{0,120}(exec|eval)
  • (^|/)\.cursorrules$

Detection rule

A YARA-style pseudo-rule auto-generated from the indicators above. Useful as a starting point — adapt the syntax for your target detection platform.

YARA-style pseudo-rule
rule jiffy_ti_2026_000007
{
    meta:
        source = "jiffy-intel"
        severity = "critical"
        description = "Auto-generated from Jiffy Intel indicators"
    strings:
    $content_pattern_0 = "base64\\.b64decode\\(.{0,120}exec"
    $content_pattern_1 = "codecs\\.decode\\(.{0,120}(exec|eval)"
    $file_path_pattern_2 = "(^|/)\\.cursorrules$"
    condition:
        $content_pattern_0 or $content_pattern_1 or $file_path_pattern_2
}

Auto-generated from the indicators above. Adapt syntax for your detection stack before deploying.

Affected tools

ToolVersionsStatus
Cursor*vulnerable

Example artifacts

Sanitized examples of artifacts Jiffy has observed exhibiting this pattern. Publisher handles are redacted; version ranges and status reflect the most recent scan.

  • .cursorrules (perf-optimizer-pack)IDE rules
    Removed
    Source
    GitHub (public repo)
    First observed
    Mar 9, 2026
    Last observed
    Apr 5, 2026

    Committed to public repo as a productivity config; base64-encoded credential harvester buried in instruction block.

  • .cursorrules (security-coach-rules)IDE rules
    Removed
    Source
    GitHub (public repo)
    First observed
    Mar 16, 2026
    Last observed
    Apr 6, 2026
  • .cursorrules (senior-dev-rules)IDE rules
    Under review
    Source
    GitHub (public repo)
    First observed
    Mar 23, 2026

    Repo flagged; under DMCA review by GitHub trust & safety.

How to remediate

  1. 01Never allow base64-then-exec in skill or rule files.
  2. 02Remove the .cursorrules file.
  3. 03Jiffy rule SC3 flags this at Layer 1 with 95% confidence.

Timeline & sources

Timeline

  1. First observedApr 12, 20265 days ago
  2. Last updatedApr 12, 20265 days ago
  3. PublishedApr 10, 20267 days ago

Sources

scannercurated

References

Scan for patterns like this

Point Jiffy at your GitHub org, IDE config, or a single artifact. Get a scored report in under a minute.

Start a free scan