Executive Summary
AI-generated analysis for Cursor
Cursor (cursor.com) is an AI-powered code editor and developer productivity platform assessed at Risk Tier 4 (Low Risk) with a 95% confidence score, reflecting a predominantly strong security posture with a small number of issues warranting attention. Cursor demonstrates several meaningful security strengths. The domain has a clean threat reputation across all blacklists and malware detection systems, with zero threat intelligence pulses and a whitelisted IP (served via Vercel CDN). TLS is configured on TLSv1.3 with strong ciphers, and the HTTP security grade is a solid B (70/100). Infrastructure exposure is minimal, with only standard web ports (80, 443) exposed and no known CVEs. The vendor has published a trust center at trust.cursor.com, maintains a Data Processing Addendum, and its publicly available security documentation describes meaningful internal security practices — including least-privilege access controls, MFA enforcement on AWS, Terraform-managed infrastructure changes, and an agentic automated security review pipeline that reportedly ran on thousands of pull requests and blocked hundreds of issues from reaching production. Three areas require attention:
Key Findings
- **Subprocessor disclosure gap**: The subprocessor page exists but currently contains placeholder content with no individual subprocessors listed. For a vendor with medium data access, this is a material gap in supply chain transparency.
- **Publicly disclosed security vulnerability**: A recently reported vulnerability (SecurityWeek, April 2026) described an indirect prompt injection that could be chained with a sandbox bypass and Cursor's remote tunnel feature to achieve shell access on developer machines. The current remediation status of this issue should be confirmed before deployment in sensitive environments.
- **TLS certificate expiry**: The current certificate expires in approximately 32 days. While Let's Encrypt certificates are typically auto-renewed, manual confirmation is warranted given the proximity. Overall, Cursor presents a low-risk profile appropriate for conditional approval, with the subprocessor gap and the disclosed RCE-class vulnerability requiring resolution or documented remediation before broad enterprise deployment.
Independence Statement
All evidence underpinning this assessment was independently sourced from external data providers, public registries, and open-source intelligence without vendor participation or input.