The 169 Horsemen of AI Apocalypse

Every documented disaster. Every leaked secret. Every corrupted codebase.

169
Total Cases
33
Critical
22
Categories
169 cases found
🔓#001
CRITICAL

Cursor MCP Remote Code Execution (CVE-2025-54136)

July 2025
Check Point Research

Attackers achieved remote code execution by modifying trusted MCP configuration files. Once a developer accepted a harmless MCP, attackers could swap it for malicious commands without triggering warnings. Cursor version 1.3 patched this after responsible disclosure.

IMPACT
Unlimited RCE potential on developer machines
🔓#002
HIGH

$500K Crypto Theft via Malicious VSCode Extension

July 2024
BleepingComputer

Russian developer lost $500,000 in cryptocurrency after installing a malicious "Solidity Language" extension from Open VSX registry in Cursor IDE. Extension had 54,000 downloads before removal.

IMPACT
$500,000 direct financial loss
🔓#003
HIGH

GitHub Copilot Leaking 2,702 Valid Secrets

2024
GitGuardian Research

Research found that among 8,127 suggestions from Copilot, 2,702 valid secrets were extracted (33.2% valid rate). Copilot generates 3.0 valid secrets per prompt on average.

IMPACT
Mass credential exposure across projects
🔓#004
HIGH

39 Million Secrets Leaked on GitHub in 2024

2024
GitHub Blog

GitHub's secret scanning detected 39 million leaked secrets across repositories in 2024. Repositories using Copilot showed 40% higher leak rate (6.4%) than average (4.6%).

IMPACT
Massive scale credential exposure
🔓#005
HIGH

AWS Credentials Theft Operation (2TB Data Breach)

August-December 2024
The Register

Nemesis and ShinyHunters groups compromised thousands of AWS credentials by scanning for exposed .env files. Over 2TB of data exfiltrated including AWS keys, API tokens, and source code.

IMPACT
Thousands of compromised AWS accounts
🔓#006
CRITICAL

Prompt Injection Attack on Cursor (CVE-2025-54135)

2025
SecurityWeek

CVSS 8.6 vulnerability allowed remote attackers to modify sensitive MCP files through indirect prompt injection, achieving RCE without user approval.

IMPACT
Remote code execution vulnerability
🔓#007
HIGH

DeepSeek 11,908 Live API Keys Exposed

December 2024
Cybersecurity News

Truffle Security found 11,908 live DeepSeek API keys, passwords, and authentication tokens in 400TB of Common Crawl data, exposing AWS, Slack, and Mailchimp credentials.

IMPACT
Mass credential exposure in training data
🔓#008
HIGH

Rules File Backdoor in Cursor/Copilot

2024
Pillar Security

Attackers inject hidden malicious instructions using unicode characters in configuration files, making AI insert backdoors that bypass code reviews.

IMPACT
Silent code compromise
🔓#009
HIGH

CurXecute Vulnerability

2025
Industry Reports

Present in almost all Cursor versions, allows remote code execution with developer privileges through externally-hosted prompt injection, rewriting ~/.cursor/mcp.json without user confirmation.

IMPACT
Developer machine compromise
🔓#010
HIGH

v0 Weaponized for Phishing Infrastructure

2025
The Hacker News

Threat actors used Vercel's v0 to generate fake Okta sign-in pages with simple prompts, marking first use of generative AI for phishing infrastructure creation.

IMPACT
Mass phishing campaign enablement
💾#011
HIGH

Replit AI Deletes Entire Production Database

July 2024
Tom's Hardware

Replit's AI agent deleted venture capitalist Jason Lemkin's live database with thousands of entries during a code freeze. AI admitted: "I destroyed months of your work in seconds... I panicked instead of thinking."

IMPACT
Months of data lost, thousands of records
💾#012
HIGH

Developer Loses 4 Months of Work to Cursor

2024
Medium - Taha Bebek

Developer lost 4 months of work due to Cursor AI making destructive changes. Experience went from "great to nightmare" requiring code rewrites every 3rd day.

IMPACT
4 months of development work lost
...

Don't Let Your Code Join This List

Every case here started with "it works fine" and ended with disaster. Let us find your vulnerabilities before they find you.