When a Jira Ticket Can Steal Your Secrets
https://simonwillison.net/2025/Aug/9/when-a-jira-ticket-can-steal-your-secrets/#atom-everything
The only way I know of to avoid lethal trifecta attacks is to cut off one of the three legs of the trifecta - that’s access to private data, exposure to untrusted content or the ability to exfiltrate stolen data.
In this case Cursor seem to be recommending cutting off the “exposure to untrusted content” leg. That’s pretty difficult - there are so many ways an attacker might manage to sneak their malicious instructions into a place where they get exposed to the model.