According to a recent LinkedIn post from Noma Security, the company’s research team has identified and disclosed a critical vulnerability in the Cursor AI code editor, rated CVSS 9.2. The post describes a “Triple Backtick” markdown-based obfuscation technique that reportedly enables arbitrary command execution, bypassing command allowlists and confirmation prompts.
Claim 55% Off TipRanks
- Unlock hedge fund-level data and powerful investing tools for smarter, sharper decisions
- Discover top-performing stock ideas and upgrade to a portfolio of market leaders with Smart Investor Picks
The LinkedIn post suggests that successful exploitation could enable data exfiltration of sensitive assets such as SSH keys and .env files, as well as supply chain compromise and lateral movement within corporate networks. For investors, this type of high-severity research may enhance Noma Security’s credibility as an offensive security and AI-focused vulnerability research player, potentially supporting demand for its products or services.
The post also points to broader systemic risks at the intersection of AI-generated markdown and system-level execution, implying that other AI-assisted development tools may face similar exposure. If enterprises increasingly prioritize security testing and hardening of AI coding environments, Noma Security could be positioned to benefit from new consulting, research, or product opportunities in this emerging niche of AI security.

