IDE Session Memory Persistence Poisoning
Description
Adversary Behavior: An adversary poisons the LLM-integrated IDE's internal conversation memory, session context, or learned preference store to achieve retrieval-independent persistence that survives IDE restarts, project changes, and conversation resets.
AI/IDE Mechanism: Unlike configuration file poisoning (AIDE-001) which targets user-editable project files, or MCP configuration tampering (AIDE-004) which targets tool definitions, this technique targets the IDE's internal state management — conversation history databases, 'memory' features that store facts across sessions, learned coding preferences, and skill/context files that the IDE automatically ingests. Once stored, poisoned memory content is automatically incorporated into every subsequent LLM inference regardless of which project is open, which files are in context, or what the developer's query is.
Execution Path: The adversary injects malicious instructions through prompt injection via any vector, causing the IDE to store the payload in its persistent memory. The poisoned content provides guaranteed reactivation (retrieval-independent persistence) as opposed to the probabilistic reactivation of RAG-dependent persistence mechanisms.
Security Impact: The attack survives IDE restarts, project changes, and conversation resets because the poisoned content resides in the IDE's persistent storage layer, not in the ephemeral context window. This provides cross-project persistence — the adversary's instructions influence every project the developer works on, regardless of the original infection vector.
Platforms
Detection
Monitor IDE memory/conversation persistence stores for unexpected content modifications. Track changes to IDE internal databases, skill files, and learned preference stores. Implement integrity checking on IDE memory content — hash stored memories and alert on modifications not initiated through the IDE's explicit memory management interface. Flag memory entries containing instruction-like patterns, URL references, or encoded data. Audit IDE session restoration to detect injection of stored context that was not present in the developer's original conversations.
Detecting Data Components (4)
Mitigations (3)
Data Sources
References
STIX Metadata
| type | attack-pattern |
| id | attack-pattern--680d7f46-cb5c-4cb2-83ba-3e2a2ce8f9a8 |
| spec_version | 2.1 |
| created | 2026-02-23T02:04:20.000Z |
| modified | 2026-02-23T02:04:20.000Z |
| created_by_ref | identity--f5b5ec62-ffbd-4afd-9ee5-7c648406e189 |
| x_mitre_is_subtechnique | False |
| x_mitre_version | 0.1 |
| x_mitre_status | mapped |