Exploit Cursor Agents to create persistent, distributed threats

11 points by ike