Noticed a strange directory in my Desktop, a particular extraction of some files of another working folder in my Desktop with rather private information.

Timestamps match when Cursor was open and running, which somehow had permission to the Desktop folder.

I have no proof but take this as a warning sign. Agents creating and executing random code in one's computer unbound is a recipe for disaster.

Anyone got ideas on how to containerize these programs?

Reply to this note

Please Login to reply.

Discussion

Use virtual machines for everything that can't be trusted.

Recommendations? It seems difficult in practice

The one I'm using when needed is VM VirtualBox www.virtualbox.org

On first start it looks complicated but it's not that hard you don't need to understand every option. It's just a computer inside of a computer and you ficede what main computer shares with that virtual computer :)

Youtube is your friend in learning the basics. Network Chuck is pretty good in explaining stuff. And also LLMs also knows a lot and can be your personal tutor in this case.

Here's Chuck https://youtu.be/wX75Z-4MEoM

Easy 😉

Thanks. Using Mac so I will look to UTM probably