Install the Cursor extension
Streamline your secure development workflow with the Fluid Attacks extension for Cursor. This powerful tool helps you identify and address vulnerabilities without leaving this AI-powered IDE.
These are the key features of this plugin:
- View the specific files and lines of code with reported vulnerabilities.
- Access detailed documentation on your code's vulnerabilities.
- Accept vulnerabilities temporarily.
- Leverage Claude Sonnet's AI model to generate custom guides for fixing vulnerabilities or fix vulnerabilities automatically.
- Request reattacks.
To learn about these features, read Identify and address vulnerabilities from Cursor.
Download the extension
To download the extension, follow these steps:
- Open Cursor.
- Access the extensions view.
- Type Fluid Attacks in the search bar.
- Locate the extension and click on Install.
Configuring the extension requires a valid API token.
Generate one before proceeding with the steps below.
After downloading the extension, you need to configure it to connect the Fluid Attacks platform with Cursor. Follow these steps:
-
Type the following into the input bar: >Fluid Attacks: set Fluid Attacks token.
- Paste your API token into the input bar and press Enter.
- Use Ctrl/Cmd + R to refresh the IDE.
Verify successful installation
The extension analyzes the files you provide as input, so ensure you include all relevant files for comprehensive vulnerability management.
- Open the base folder of your Git repository in Cursor.
-
You should see the Fluid Attacks extension icon in the IDE's activity bar and red dots on files with identified vulnerabilities. This confirms successful configuration.
Note: Some extension features require Git history. Ensure your project is a Git repository cloned using Git.