âUnfortunately, because of the natural language nature of prompt injections, blocking them using classifiers or any kind of blacklisting isnât enough,â they said in their report. âThere are just too many ways to write them, hiding them behind benign topics, using different phrasings, tones, languages, etc. Just like we donât consider malware fixed because another sample made it into a deny list, the same is true for prompt injection.â
Hijacking Cursor coding assistant via Jira tickets
As part of the same research effort, Zenity also investigated Cursor, one of the most popular AI-assisted code editors and IDEs. Cursor can integrate with many third-party tools, including Jira, one of the most popular project management platforms used for issue tracking.
âYou can ask Cursor to look into your assigned tickets, summarize open issues, and even close tickets or respond automatically, all from within your editor. Sounds great, right?â the researchers said. âBut tickets arenât always created by developers. In many companies, tickets from external systems like Zendesk are automatically synced into Jira. This means that an external actor can send an email to a Zendesk-connected support address and inject untrusted input into the agentâs workflow.â