【Privacy Leakage】Encrypt local SQLite databases to prevent unauthorized telemetry and resource contention

Feature request for product/service

Cursor IDE

Describe the request

Currently, Cursor’s local data (chat history, compose logs, metrics) is stored in plain-text SQLite files. This allows any local process or third-party script to scrape sensitive developer data without any authentication.
The Problem (Why this is critical):

Unauthorized Surveillance: In corporate environments, we are seeing scripts/plugins being forced upon developers to scrape AI interaction data for “productivity tracking.” This creates a “Panopticon” effect, discouraging developers from using AI freely and creatively.

Performance Degradation: Constant polling of the database by external tools causes SQLite locking issues, leading to UI lag and data corruption within Cursor itself.

Security Risk: Any malicious local script can exfiltrate the entire context of a proprietary codebase by simply reading the local database files.

Request: Please implement at-rest encryption (e.g., SQLCipher) for all local databases. Access should be restricted to the Cursor process only

Operating System (if it applies)

MacOS

any update

any official response?