look at the last column and your favorite LLM for how likely they are to produce correct code (which for you seems fine), yet insecure code (which is great for attackers), that's from #baxbench project
Posts by DevDefender
Introducing the DevDefender Security Digest: a collection of relevant news, security threats, and vulnerability reports that affect developers, software pipelines, IDEs, and dev environments.
Versions prior to 2026.1.14 of mcp-server-git are vulnerable to data exfiltration through relative path traversal, allowing paths outside the repository to be added to the repo and exfiltrated by committing and pushing the repository.
There is no foolproof method of preventing all prompt injection attacks, but there are some ways to limit the scope of such an attack. This is not one of those ways.
shoutout to the @socket.dev team for the incredible report.
SANDWORM_MODE is a supply chain worm that has similarities to Shai-Hulud and poisons AI Agents using an innocuous-looking MCP server installed on the developer machine.
OX Security has found four new vulnerable extensions in VSCode with 128M collective downloads: RCE and remote & local exfil.
Zed LSP without Restricted Mode enabled allows a project's settings configuration to load arbitrary code when a repository is opened.
VSCode, Cursor, and any other editor based on Visual Studio Code are vulnerable to an auto-exec vulnerability that is triggered by a simple, everyday task: opening a folder.
A little #intro - we're building an open-source #EDR for Developers.
The dev environment is getting more and more hostile. We build tools and tutorials to help you defend your code from your own dev environment: #malicious configurations, extensions, and more.
Test our pre-alpha: devdefender.net