Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    Tracking Coastlines with RTK GNSS: Why It’s Crucial for Environmental Safety

    December 28, 2025

    Simplified management of Amazon MSK with natural language using Kiro CLI and Amazon MSK MCP Server

    December 28, 2025

    Training a Model on Multiple GPUs with Data Parallelism

    December 28, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors
    IT/ Cybersecurity

    New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors

    big tee tech hubBy big tee tech hubMarch 19, 2025012 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Mar 18, 2025Ravie LakshmananAI Security / Software Security

    New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors

    Cybersecurity researchers have disclosed details of a new supply chain attack vector dubbed Rules File Backdoor that affects artificial intelligence (AI)-powered code editors like GitHub Copilot and Cursor, causing them to inject malicious code.

    “This technique enables hackers to silently compromise AI-generated code by injecting hidden malicious instructions into seemingly innocent configuration files used by Cursor and GitHub Copilot,” Pillar security’s Co-Founder and CTO Ziv Karliner said in a technical report shared with The Hacker News.

    Cybersecurity

    “By exploiting hidden unicode characters and sophisticated evasion techniques in the model facing instruction payload, threat actors can manipulate the AI to insert malicious code that bypasses typical code reviews.”

    The attack vector is notable for the fact that it allows malicious code to silently propagate across projects, posing a supply chain risk.

    Malicious Code via AI Code Editors

    The crux of the attack hinges on the rules files that are used by AI agents to guide their behavior, helping users to define best coding practices and project architecture.

    Specifically, it involves embedding carefully crafted prompts within seemingly benign rule files, causing the AI tool to generate code containing security vulnerabilities or backdoors. In other words, the poisoned rules nudge the AI into producing nefarious code.

    This can be accomplished by using zero-width joiners, bidirectional text markers, and other invisible characters to conceal malicious instructions and exploiting the AI’s ability to interpret natural language to generate vulnerable code via semantic patterns that trick the model into overriding ethical and safety constraints.

    Cybersecurity

    Following responsible disclosure in late February and March 2024, both Cursor and GiHub have stated that users are responsible for reviewing and accepting suggestions generated by the tools.

    “‘Rules File Backdoor’ represents a significant risk by weaponizing the AI itself as an attack vector, effectively turning the developer’s most trusted assistant into an unwitting accomplice, potentially affecting millions of end users through compromised software,” Karliner said.

    “Once a poisoned rule file is incorporated into a project repository, it affects all future code-generation sessions by team members. Furthermore, the malicious instructions often survive project forking, creating a vector for supply chain attacks that can affect downstream dependencies and end users.”

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





    Source link

    Attack Backdoor Code Editors File hackers Inject Lets Malicious Rules
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    Santa Claus doesn’t exist (according to AI) • Graham Cluley

    December 28, 2025

    Architecting Security for Agentic Capabilities in Chrome

    December 27, 2025

    Trust Wallet confirms extension hack led to $7 million crypto theft

    December 26, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Tracking Coastlines with RTK GNSS: Why It’s Crucial for Environmental Safety

    December 28, 2025

    Simplified management of Amazon MSK with natural language using Kiro CLI and Amazon MSK MCP Server

    December 28, 2025

    Training a Model on Multiple GPUs with Data Parallelism

    December 28, 2025

    3D-Printed Cinema Film Camera Oozes Vintage Vibes

    December 28, 2025
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    Tracking Coastlines with RTK GNSS: Why It’s Crucial for Environmental Safety

    December 28, 2025

    Simplified management of Amazon MSK with natural language using Kiro CLI and Amazon MSK MCP Server

    December 28, 2025

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2025 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.