Top 10 findings
What you'll learn in this report

1.
Why AI code editors create an entirely new attack surface, with real-world exploits emerging within days, sometimes in as little as 48 hours.
2.
How prompt injection turns becomes direct code execution in agentic IDEs, enabling RCE and sandbox escapes without relying on zero-day vulnerabilities.
3.
Which agent capabilities produce the largest blast radius when compromised, including file access, shell execution, network access and persistent memory.
4
How insecure defaults power every documented AI IDE attacks to date, not sophisticated exploit chains.
5.
Why traditional AppSec tools fails to observe these attacks, and what effective detection must look like for AI agents.