{"id":6334,"date":"2025-12-06T17:17:32","date_gmt":"2025-12-06T17:17:32","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/12\/06\/researchers-uncover-30-flaws-in-ai-coding-tools-enabling-data-theft-and-rce-attacks\/"},"modified":"2025-12-06T17:17:32","modified_gmt":"2025-12-06T17:17:32","slug":"researchers-uncover-30-flaws-in-ai-coding-tools-enabling-data-theft-and-rce-attacks","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/12\/06\/researchers-uncover-30-flaws-in-ai-coding-tools-enabling-data-theft-and-rce-attacks\/","title":{"rendered":"Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks"},"content":{"rendered":"<p>\u200bOver 30 security vulnerabilities have been disclosed in various artificial intelligence (AI)-powered Integrated Development Environments (IDEs) that combine prompt injection primitives with legitimate features to achieve data exfiltration and remote code execution.<br \/>\nThe security shortcomings have been collectively named IDEsaster by security researcher Ari Marzouk (MaccariTA). They affect popular\u00a0Over 30 security vulnerabilities have been disclosed in various artificial intelligence (AI)-powered Integrated Development Environments (IDEs) that combine prompt injection primitives with legitimate features to achieve data exfiltration and remote code execution.<br \/>\nThe security shortcomings have been collectively named IDEsaster by security researcher Ari Marzouk (MaccariTA). They affect popular\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bOver 30 security vulnerabilities have been disclosed in various artificial intelligence (AI)-powered Integrated Development Environments (IDEs) that combine prompt injection primitives with legitimate features to achieve data exfiltration and remote code execution. The security shortcomings have been collectively named IDEsaster by security researcher Ari Marzouk (MaccariTA). They affect popular\u00a0Over 30 security vulnerabilities have been disclosed&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/12\/06\/researchers-uncover-30-flaws-in-ai-coding-tools-enabling-data-theft-and-rce-attacks\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":6335,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/6334"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=6334"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/6334\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/6335"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=6334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=6334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=6334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}