These don't seem notable. Most IDEs are used to edit code; if the attacker is able to prompt-inject them into editing arbitrary files, then you are screwed the next time you press 'Run' in your editor. That is a problem much more serious than making an HTTP request with data to exfiltrate.
AI blogspam.
These don't seem notable. Most IDEs are used to edit code; if the attacker is able to prompt-inject them into editing arbitrary files, then you are screwed the next time you press 'Run' in your editor. That is a problem much more serious than making an HTTP request with data to exfiltrate.