We propose adopting Cursor AI as an AI-enhanced coding assistant to support developer productivity in local development environments only. To maximize its utility, we recommend using Privacy Mode with Storage, which enables powerful features (like Background Agent) without training on our code or data.
Cursor integrates directly with the developer's IDE to enhance:
- Code understanding
- Autocompletion
- Intelligent editing
- Local codebase search
- AI pair programming
It routes all prompt requests through the Cursor backend, even when using a personal OpenAI API key. This enables consistent and optimized prompt building.
We propose enabling Privacy Mode with Storage, which offers a strong privacy baseline while enabling feature-rich capabilities.
| Privacy Setting | Code Stored Temporarily | Training Usage | Access to Full Features |
|---|---|---|---|
| Privacy Mode with Storage | β Yes (for features) | β Never used for training | β Yes |
Key Note: Even with storage enabled, Cursor never uses our code for training, nor shares it with third parties.
- Local development environments only
- No access to production systems
- No access to live databases or PHI
- Used with sample/test data
- Cursor uploads code in small chunks to compute embeddings for search and context.
- Plaintext code is discarded after processing.
- Only obfuscated metadata and hashed file references are stored.
- Files are cached temporarily during processing.
- Encryption keys are generated per session and expire after the request.
flowchart TD
A["Developer IDE (Cursor)"] --> B["Cursor Backend (Prompt Building)"]
B --> C["LLM API (e.g. OpenAI/Fireworks)"]
B --> D[Ephemeral Code Chunking for Indexing]
D --> E[Embedding Computation]
E -->|Metadata only| F[(Obfuscated Metadata + Embeddings)]
subgraph Privacy Mode Setting
G2[Privacy Mode with Storage]
end
G2 -->|Temporary storage<br>Strict no-training| F
style F fill:#fff3cd,stroke:#ffc107,color:#856404
style G2 fill:#fff3cd,stroke:#ffc107,color:#856404
| Concern | Cursor (Privacy Mode w/ Storage) Handling |
|---|---|
| PHI or PII exposure | β None β tool will not be used with real or sensitive data |
| Production system access | β None β strictly for local development |
| Long-term code retention | π Code stored temporarily for feature use, never persisted beyond necessity |
| Training on internal code | β Never trained on or shared with third parties |
| Data encryption | β Encrypted file contents with ephemeral session-based keys |
- Obtain approval from security and architecture teams
- Enable Privacy Mode with Storage during onboarding
- Define usage policy: strictly for dev environments, no PHI/PII, internal code only
- Monitor usage and reassess privacy settings as needed