Snyk or Sneaky? Allegations Fly Over Malicious NPM Packages Targeting AI Code Editor
Snyk finds itself in the spotlight after alleged “malicious” package uploads to NPM targeted Cursor, an AI code editor company. Security researcher Paul McCarty discovered the suspicious packages, while theories swirl about potential dependency confusion testing. Snyk and Cursor remain tight-lipped, but conspiracy theorists are having a field day.

Hot Take:
Looks like Snyk might have been caught with their hand in the cookie jar, but who knew the cookie jar was filled with suspicious packages targeting Cursor? Maybe they were just trying to send a love letter to Cursor, but it got lost in translation and ended up as a malicious package. Whoops!
Key Points:
- Security researcher Paul McCarty discovered malicious NPM packages possibly targeting Cursor.
- The packages were uploaded by “sn4k-s3c” and had names resembling Cursor’s private packages.
- These packages collected sensitive data when installed, potentially compromising credentials.
- Snyk is allegedly involved, with packages traced back to a Snyk.io email address.
- Speculation abounds, with theories ranging from foul play to clumsy security testing.
Already a member? Log in here