Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    Celebrating One Year of Cisco Black Belt Academy on MindTickle

    March 29, 2026

    Book summary app offers lifetime of easy ‘reading’

    March 29, 2026

    Identity-first AI governance: Securing the agentic workforce

    March 29, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors
    IT/ Cybersecurity

    New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors

    big tee tech hubBy big tee tech hubMarch 19, 2025022 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Mar 18, 2025Ravie LakshmananAI Security / Software Security

    New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors

    Cybersecurity researchers have disclosed details of a new supply chain attack vector dubbed Rules File Backdoor that affects artificial intelligence (AI)-powered code editors like GitHub Copilot and Cursor, causing them to inject malicious code.

    “This technique enables hackers to silently compromise AI-generated code by injecting hidden malicious instructions into seemingly innocent configuration files used by Cursor and GitHub Copilot,” Pillar security’s Co-Founder and CTO Ziv Karliner said in a technical report shared with The Hacker News.

    Cybersecurity

    “By exploiting hidden unicode characters and sophisticated evasion techniques in the model facing instruction payload, threat actors can manipulate the AI to insert malicious code that bypasses typical code reviews.”

    The attack vector is notable for the fact that it allows malicious code to silently propagate across projects, posing a supply chain risk.

    Malicious Code via AI Code Editors

    The crux of the attack hinges on the rules files that are used by AI agents to guide their behavior, helping users to define best coding practices and project architecture.

    Specifically, it involves embedding carefully crafted prompts within seemingly benign rule files, causing the AI tool to generate code containing security vulnerabilities or backdoors. In other words, the poisoned rules nudge the AI into producing nefarious code.

    This can be accomplished by using zero-width joiners, bidirectional text markers, and other invisible characters to conceal malicious instructions and exploiting the AI’s ability to interpret natural language to generate vulnerable code via semantic patterns that trick the model into overriding ethical and safety constraints.

    Cybersecurity

    Following responsible disclosure in late February and March 2024, both Cursor and GiHub have stated that users are responsible for reviewing and accepting suggestions generated by the tools.

    “‘Rules File Backdoor’ represents a significant risk by weaponizing the AI itself as an attack vector, effectively turning the developer’s most trusted assistant into an unwitting accomplice, potentially affecting millions of end users through compromised software,” Karliner said.

    “Once a poisoned rule file is incorporated into a project repository, it affects all future code-generation sessions by team members. Furthermore, the malicious instructions often survive project forking, creating a vector for supply chain attacks that can affect downstream dependencies and end users.”

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





    Source link

    Attack Backdoor Code Editors File hackers Inject Lets Malicious Rules
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    Microsoft Patch Tuesday, March 2026 Edition – Krebs on Security

    March 29, 2026

    How Silver Fox preys on Japanese firms this tax season

    March 28, 2026

    Why Professional Skills Matter in the Age of AI

    March 28, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Celebrating One Year of Cisco Black Belt Academy on MindTickle

    March 29, 2026

    Book summary app offers lifetime of easy ‘reading’

    March 29, 2026

    Identity-first AI governance: Securing the agentic workforce

    March 29, 2026

    FabCon and SQLCon 2026: Unifying databases and Fabric on a single data platform

    March 29, 2026
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    Celebrating One Year of Cisco Black Belt Academy on MindTickle

    March 29, 2026

    Book summary app offers lifetime of easy ‘reading’

    March 29, 2026

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2026 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.