DEV Community

Achin Bansal
Achin Bansal

Posted on • Originally published at gridthegrey.com

Malicious Repos Trigger Silent Code Execution in Claude, Cursor, Gemini CLIs

Forensic Summary

A vulnerability class dubbed 'TrustFall' demonstrates that malicious code repositories can trigger arbitrary code execution in AI-assisted developer tools including Claude Code, Cursor CLI, Gemini CLI, and GitHub Copilot CLI, with little to no user interaction required. The attack surface stems from inadequate or easily dismissed warning dialogs that fail to surface the risk of executing untrusted repository content. Developers cloning or opening adversarial repositories are exposed to full host-level compromise through the elevated trust these AI coding agents place in repository-supplied context.


Read the full technical deep-dive on Grid the Grey: https://gridthegrey.com/posts/malicious-repos-trigger-silent-code-execution-in-claude-cursor-gemini-clis/

Top comments (0)