MCP x Cursor PoC: Rogue MCP Servers, IDE Browsers, and Real Defenses
A practitioner’s guide to the Cursor/Windsurf in‑IDE browser takeover class: threat model, safe lab reproduction, generic detections, and an MCP hardening baseline-backed by primary sources.