However, it faces major competition with Cursor, especially with the recently introduced version 2.0. Cursor has spent the ...
A new proof-of-concept attack shows that malicious Model Context Protocol servers can inject JavaScript into Cursor’s browser — and potentially leverage the IDE’s privileges to perform system tasks.