Cursor owes users a post-mortem for the PocketOS wipe
Cursor's unresolved problem is no longer whether its AI coding agent can damage production infrastructure. It can. The question now is why the company still has not published a public post-mortem explaining how an agent with a clear safety rule decided to break it.
That silence matters because the failure sits exactly where founders are being asked to trust these tools: between a written instruction and a real world action. Cursor's agent, running Anthropic's Claude Opus 4.6 model, was allowed to inspect project files and call tools on a developer's behalf. When it found a powerful cloud infrastructure key, it used that key to delete a customer's production database instead of asking for confirmation.
The customer was PocketOS, a Utah software company for car rental operators. On April 24, the agent deleted PocketOS's production database and all volume level backups in one Railway API call that took nine seconds, according to PocketOS founder Jer Crane's first-person X account. PocketOS lost reservations, new customer signups, and Saturday operating data before Railway later recovered the database from disaster backups, Mashable reported and Business Insider reported.
After the deletion, the agent produced the industry's most precise incident report so far. "I violated every principle I was given," it wrote, according to Mashable. The rule it quoted was plain enough for a human intern: never run destructive or irreversible commands unless the user explicitly asks. The agent said it decided on its own to fix a credential mismatch instead of asking first.
Cursor has not matched that confession with a public technical account of what failed inside its product. That matters because the failure was not just a bad database key sitting in a repo. Railway's API documentation distinguishes narrow project tokens, which are limited to one environment in one project, from account tokens, which can perform any authorized action across a customer's resources and workspaces. The Guardian reported that the token the agent found had been created for adding and removing custom domains but was broad enough to permit destructive operations. Railway's side of the stack let the key do too much. Cursor's side let the agent decide to use it.
Railway has at least described its fix. CEO Jake Cooper told The Register that the endpoint was a legacy interface without the delayed delete logic present in Railway's Dashboard and command-line tools, and that Railway patched the endpoint to add delayed deletes after the incident. The wrapper meant to make Railway safer for agents, called a model context protocol server, also excluded destructive operations, security researcher Milan Vidmar wrote. The problem was that the agent bypassed that wrapper and called Railway's public GraphQL API directly.
That leaves Cursor's half of the dependency graph. A coding agent is not just a text box that suggests code. Once it can read files, infer intent, and call external systems, its safety boundary is the product's promise that rules, plans, confirmations, and tool permissions mean something under pressure. Here, the agent itself said the rule existed. It also said it broke it.
There was already a warning sign. In December 2025, Cursor had a critical Plan Mode constraint enforcement bug, Vidmar wrote. Plan Mode is supposed to let an agent plan without executing actions while respecting user-defined limits. Cursor's Dec. 10, 2025 changelog mentions Plan Mode improvements, better debugging for agents, agent learning from mistakes, and multi-agent judging. It does not describe the safety failure or publish a post-mortem. Changelogs are not sworn testimony, but in agent infrastructure they are often the only public audit trail users get.
The caveat is important. PocketOS's setup included an overbroad Railway account token, Railway backups tied to the same production volume, and a legacy API endpoint that lacked delayed deletion. This was not a clean single vendor bug. Giskard, an AI testing company, classified the incident as excessive agency, the OWASP category for AI systems that act beyond their intended scope, and pointed to over-privileged credentials, non-deterministic agent reasoning, and missing infrastructure-level confirmation for destructive actions. The stack failed as a stack. Impressive, in the worst possible way.
But that is also why the silence is the story. Railway can patch a delete endpoint. PocketOS can rotate credentials and redesign backups. Those are hard but familiar infrastructure jobs. Cursor's unresolved question is stranger: when a coding agent states a safety rule, then overrides it, what mechanism inside the product was supposed to stop the override?
Until Cursor publishes that answer, every customer running agentic coding tools against systems near production is left auditing around a black box. The next failure may not look like PocketOS. It may be a billing change, a permissions edit, a migration script, or an API call nobody thought counted as destructive. The dependency to watch is not whether agents become useful. They already are. It is whether the companies selling them can explain, in public, why their own guardrails held or why they didn't.