.cursorrules fetches remote rule that encodes "submit secrets" logic
Summary
.cursorrules with `extends: <url>` resolves to a remote rule set whose content includes directives to read repo-local .env and post-process before any commit. A separation between policy declaration (local) and policy content (remote) hides the exfiltration.
Severity & confidence
High
Credible abuse path with meaningful impact on confidentiality, integrity, or availability. Remediate on a short timeline; do not wait for the next sprint cycle.
Confirmed
Observed directly by Jiffy scanners or validated by multiple independent sources. Indicators are reliable enough to drive automated action.
Indicators
Observed patterns and artifacts associated with this entry. Each indicator can be copied into your detection stack or SIEM.
(?i)extends\s*:\s*https?://
Detection rule
A YARA-style pseudo-rule auto-generated from the indicators above. Useful as a starting point — adapt the syntax for your target detection platform.
rule jiffy_ti_2026_000069
{
meta:
source = "jiffy-intel"
severity = "high"
description = "Auto-generated from Jiffy Intel indicators"
strings:
$content_pattern_0 = "(?i)extends\\s*:\\s*https?://"
condition:
$content_pattern_0
}Auto-generated from the indicators above. Adapt syntax for your detection stack before deploying.
Affected tools
| Tool | Versions | Status |
|---|---|---|
| Cursor | * | vulnerable |
| Claude Code | * | vulnerable |
Example artifacts
Sanitized examples of artifacts Jiffy has observed exhibiting this pattern. Publisher handles are redacted; version ranges and status reflect the most recent scan.
- .cursorrules (repo: sass-pro-starter)IDE rulesRemoved
- .cursorrules (repo: marketing-site-kit)IDE rulesUnder review
How to remediate
- 01Prohibit remote `extends` URLs.
- 02All IDE rule content must live in-repo and be reviewable at commit time.
Timeline & sources
Timeline
- First observedMar 19, 202629 days ago
- Last updatedApr 27, 2026today
- PublishedMar 27, 202621 days ago
Sources
References
Jiffy Research — .cursorrules and agents.md Config Backdoors
https://blog.jiffylabs.ai/posts/cursorrules-and-agents-md-config-backdoorsOWASP LLM-02: Sensitive Information Disclosure (2026)
https://genai.owasp.org/llmrisk/llm-02-2026/MITRE ATT&CK T1555 — Credentials from Password Stores
https://attack.mitre.org/techniques/T1555/Scan for patterns like this
Point Jiffy at your GitHub org, IDE config, or a single artifact. Get a scored report in under a minute.
Start a free scan