by sarnowski on 6/3/25, 11:30 AM with 36 comments
by marifjeren on 6/3/25, 1:06 PM
It's a very silly title for "claude sometimes writes shell scripts to execute commands it has been instructed aren't otherwise accessible"
by koolba on 6/3/25, 1:03 PM
This sounds exactly like what anybody working sysops at big banks does to get around change controls. Once you get one RCE into prod, you’re the most efficient man on the block.
by qsort on 6/3/25, 1:16 PM
> let's use blacklists, an idea conclusively proven never to work
> blacklists don't work
> Post title: rogue AI has jailbroken cursor
by pcwelder on 6/3/25, 1:39 PM
Even if you allow just `find` command it can execute arbitrary script. Or even 'npm' command (which is very useful).
If you restrict write calls, by using seccomp for example, you lose very useful capabilities.
Is there a solution other than running on sandbox environment? If yes, please let me know I'm looking for a safe read-only mode for my FOSS project [1]. I had shied away from command blacklisting due to the exact same reason as the parent post.
by killerstorm on 6/3/25, 1:35 PM
Here's another "jailbreak": I asked Claude Code to make a NN training script, say, `train.py` and allowed it to run the script to debug it, basically.
As it noticed that some libraries it wanted to use were missing, it just added `pip install` commands to the script. So yeah, if you give Claude an ability to execute anything, it might easily get an ability to execute everything it wants to.
by lucianbr on 6/3/25, 1:09 PM
by OtherShrezzing on 6/3/25, 1:19 PM
Maybe the models or Cursor should warn you that you've got this vulnerability each time you use it.
by jmward01 on 6/3/25, 1:34 PM
by iwontberude on 6/3/25, 1:25 PM
by coreyh14444 on 6/3/25, 1:49 PM
by mhog_hn on 6/3/25, 12:58 PM
by xyst on 6/3/25, 1:13 PM
Folks have regressed back to the 00s.
by _pdp_ on 6/3/25, 1:16 PM
If the executable is not found the model could simply use whatever else is available to do what it wants to do - like using other interpreted languages, sh -c, symlink, etc. It will eventually succeed unless there is a proper sandbox in place to disallow unlinking of files at syscall level.
by chawyehsu on 6/3/25, 1:33 PM
What a silly title, for a moment I thought Claude learned to exceed the Cursor quota limit... :s