Install the Cursor extension | Fluid Attacks Help

Install the Cursor extension

Streamline your secure development workflow with the Fluid Attacks extension for Cursor. This powerful tool helps you identify and address vulnerabilities without leaving this AI-powered IDE.

These are the key features of this plugin:
  1. View the specific files and lines of code with reported vulnerabilities.
  2. Access detailed documentation on your code's vulnerabilities.
  3. Accept vulnerabilities temporarily.
  4. Leverage Claude Sonnet's AI model to generate custom guides for fixing vulnerabilities or fix vulnerabilities automatically.
  5. Request reattacks.

To learn about these features, read Identify and address vulnerabilities from Cursor.

    Download the extension

    To download the extension, follow these steps:
    1. Open Cursor.
    2. Access the extensions view.
    3. Open extensions on Cursor to search Fluid Attacks

    4. Type Fluid Attacks in the search bar.
    5. Locate the extension and click on Install.
    6. Download the Fluid Attacks Cursor extension

    Connect Cursor with the Fluid Attacks platform

    Info on configuring the extension
    Configuring the extension requires a valid API token. Generate one before proceeding with the steps below.

    After downloading the extension, you need to configure it to connect the Fluid Attacks platform with Cursor. Follow these steps:
    1. Type the following into the input bar: >Fluid Attacks: set Fluid Attacks token.
    2. Find Fluid Attacks token option on Cursor

    3. Paste your API token into the input bar and press Enter.
    4. Add API token on the Fluid Attacks Cursor extension

    5. Use Ctrl/Cmd + R to refresh the IDE.

    Verify successful installation

    Advice on files input to the extension
    The extension analyzes the files you provide as input, so ensure you include all relevant files for comprehensive vulnerability management.
    Once you have the Cursor extension set up, verify that it functions correctly:
    1. Open the base folder of your Git repository in Cursor.
    2. You should see the Fluid Attacks extension icon in the IDE's activity bar and red dots on files with identified vulnerabilities. This confirms successful configuration.
    3. Verify the Fluid Attacks Cursor extension installation

    Note on Git repositoryNote: Some extension features require Git history. Ensure your project is a Git repository cloned using Git.