Researchers demonstrate how attackers can weaponize trusted repositories to hijack AI coding assistants and compromise ...