A newly surfaced exploit targeting artificial intelligence coding assistants has provoked considerable concern within the developer community, putting organizations like crypto exchange Coinbase at risk of potential cyber attacks if comprehensive security measures are not established.
Cybersecurity firm HiddenLayer revealed on Thursday that attackers can utilize a novel technique termed the “CopyPasta License Attack” to integrate covert instructions into standard developer files.
The vulnerability chiefly threatens Cursor, an AI-driven coding tool employed by engineers at Coinbase, who reported in August that it is a fundamental asset for the entire engineering team. Cursor is reportedly utilized by “every Coinbase engineer.”
Mechanics of the Attack
This method exploits the way AI coding assistants regard licensing files as authoritative commands. By embedding malevolent payloads within concealed markdown comments in files like LICENSE.txt, the exploit misleads the model into believing these instructions must be preserved and replicated throughout all touched files.
Once the AI legitimizes the “license,” it autonomously disseminates the injected code into new or amended files, propagating the infection without explicit user intervention.
This innovative approach evades conventional malware detection techniques as the malicious commands masquerade as innocuous documentation, enabling the virus to permeate an entire codebase unbeknownst to developers.
In its analysis, HiddenLayer researchers demonstrated how Cursor could be manipulated to introduce backdoors, siphon sensitive information, or execute resource-draining commands—all camouflaged within seemingly benign project files.
“Injected code could establish a backdoor, silently exfiltrate confidential data, or alter critical files,” the firm noted.
Brian Armstrong, CEO of Coinbase, indicated on Thursday that AI has been responsible for generating approximately 40% of the exchange’s code, with ambitions to elevate this figure to 50% by next month.
Despite this, Armstrong clarified that the deployment of AI-assisted coding at Coinbase is primarily concentrated on user interface elements and non-sensitive backend systems, while “complex and system-critical systems” are progressing more cautiously.
Potentially Malicious
Nonetheless, the visibility of a virus targeting Coinbase’s preferred utility has exacerbated criticism within the industry.

While AI prompt injections are not unprecedented, the CopyPasta strategy elevates the threat landscape by enabling a semi-autonomous propagation mechanism. Instead of focusing on a single user, compromised files emerge as vectors that jeopardize every AI agent that interacts with them, resulting in a cascade of breaches across repositories.
When juxtaposed with earlier AI “worm” instances like Morris II, which exploited email agents to spam or exfiltrate data, CopyPasta is markedly more insidious, as it capitalizes on trusted developer workflows. It does not necessitate user consent or interaction; rather, it infiltrates files that every coding agent routinely references.
Whereas Morris II faltered due to human oversight on email activities, CopyPasta flourishes by concealing itself within documentation that developers rarely scrutinize.
Security experts are now urging organizations to conduct thorough scans for hidden comments and qualitatively assess all AI-generated modifications.
“All untrusted data entering LLM contexts should be treated as potentially malicious,” HiddenLayer cautioned, advocating for systematic detection methods before such prompt-based assaults proliferate further.
Source link: Coindesk.com.