Zero-Click Remote Code Execution: Exploiting MCP & Agentic IDEs
A zero-click exploit is making the roundsânasty stuff targeting agentic IDEs likeCursor. The trick? Slip a malicious Google Doc into the system. If MCP integration and allow-listedPython executionare on, the document gets auto-pulled, parsed, and runs code. No clicks. No prompts. Justremote code exe..