AI Development Tools | Cybersecurity | Software Vulnerabilities A newly identified MCPoison attack utilizes the Cursor IDE’s MCP validation process to run arbitrary commands within the system.