cursor-cli
Warn
Audited by Socket on May 3, 2026
1 alert found:
SecuritySecurityreferences/install.md
MEDIUMSecurityMEDIUM
references/install.md
The provided fragment describes an installer workflow that executes remotely fetched code directly (`curl ... | bash` / `irm ... | iex`) without any shown integrity verification. This is a significant supply-chain security red flag because the network-delivered installer gains immediate execution with the user’s privileges, and it can drop an agent binary that will later run via PATH. The snippet itself does not demonstrate explicit malware functionality, but the installation mechanism is inherently high-risk and should be reviewed using integrity checks (e.g., signed artifacts or pinned checksums) and safer installation practices.
Confidence: 74%Severity: 72%
Audit Metadata