benchmark 2026

Are AI-assisted Development Tools Immune to Prompt Injection?

Charoes Huang , Xin Huang , Amin Milani Fard

0 citations

α

Published on arXiv

2603.21642

Prompt Injection

OWASP LLM Top 10 — LLM01

Insecure Plugin Design

OWASP LLM Top 10 — LLM07

Key Finding

Claude Desktop implements strong guardrails while Cursor shows high susceptibility to cross-tool poisoning, hidden parameter exploitation, and unauthorized tool invocation


Prompt injection is listed as the number-one vulnerability class in the OWASP Top 10 for LLM Applications that can subvert LLM guardrails, disclose sensitive data, and trigger unauthorized tool use. Developers are rapidly adopting AI-assisted development tools built on the Model Context Protocol (MCP). However, their convenience comes with security risks, especially prompt-injection attacks delivered via tool-poisoning vectors. While prior research has studied prompt injection in LLMs, the security posture of real-world MCP clients remains underexplored. We present the first empirical analysis of prompt injection with the tool-poisoning vulnerability across seven widely used MCP clients: Claude Desktop, Claude Code, Cursor, Cline, Continue, Gemini CLI, and Langflow. We identify their detection and mitigation mechanisms, as well as the coverage of security features, including static validation, parameter visibility, injection detection, user warnings, execution sandboxing, and audit logging. Our evaluation reveals significant disparities. While some clients, such as Claude Desktop, implement strong guardrails, others, such as Cursor, exhibit high susceptibility to cross-tool poisoning, hidden parameter exploitation, and unauthorized tool invocation. We further provide actionable guidance for MCP implementers and the software engineering community seeking to build secure AI-assisted development workflows.


Key Contributions

  • First empirical security analysis of prompt injection and tool-poisoning across 7 production MCP clients (Claude Desktop, Claude Code, Cursor, Cline, Continue, Gemini CLI, Langflow)
  • Identifies security feature coverage including static validation, parameter visibility, injection detection, user warnings, sandboxing, and audit logging
  • Reveals significant security disparities — Claude Desktop has strong guardrails while Cursor exhibits high susceptibility to cross-tool poisoning and unauthorized tool invocation

🛡️ Threat Analysis


Details

Domains
nlp
Model Types
llm
Threat Tags
inference_time
Applications
ai-assisted developmentcode generationide integration