Cursor Bugreport: Shell Sandbox preflight fails (Exit 101)
Summary
After updating Cursor to 2.6.13 and restarting, Cursor shell sandbox support is no longer available on this system.
Cursor logs show sandbox detection preflight failure and set sandboxSupported=false.
Environment
- OS: Debian 13 (trixie/testing)
- Kernel:
6.12.73+deb13-amd64 - Architecture:
x86_64 - Cursor version:
2.6.13(2.6.13-1772779363)
What changed
- Cursor was upgraded from
2.6.12-1772664362to2.6.13-1772779363. - After update + restart, sandbox detection fails.
APT history excerpt:
2026-03-07 15:10:48Upgradecursor:amd64 (2.6.12-1772664362 -> 2.6.13-1772779363)
Expected behavior
Cursor shell sandbox support should be detected as available (sandboxSupported=true) as before.
Actual behavior
Cursor detects sandbox support as unavailable:
sandboxSupported=false- Sandbox preflight fails with exit code
101
Reproduction
- Start Cursor
2.6.13on Debian 13. - Open any workspace.
- Observe startup logs in
exthost.log/renderer.log. - Optional manual preflight run:
/usr/share/cursor/resources/app/resources/helpers/cursorsandbox \
--sandbox-policy-cwd /home/alex \
--sandbox-policy '{"type":"workspace_readwrite","cwd":"/home/alex","additionalReadwritePaths":[],"additionalReadonlyPaths":["/etc/ssl/cert.pem","/private/etc/ssl/cert.pem","/etc/ssl/certs/ca-certificates.crt","/etc/ssl/ca-bundle.pem","/etc/pki/tls/certs/ca-bundle.crt","/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem","/home/alex/.ssh"],"networkAccess":false,"disableTmpWrite":false}' \
--preflight-only -- /bin/true
echo $?
Observed result: 101
Relevant log evidence
From ~/.config/Cursor/logs/20260307T151135/window1/exthost/exthost.log:
[shell-exec:sandbox] [isSandboxHelperSupported] Running preflight with binary:
/usr/share/cursor/resources/app/resources/helpers/cursorsandbox
[shell-exec:sandbox] [isSandboxHelperSupported] CWD: /home/alex
[shell-exec:sandbox] [isSandboxHelperSupported] Preflight failed: Command
failed: /usr/share/cursor/resources/app/resources/helpers/cursorsandbox ...
[shell-exec:sandbox] [isSandboxHelperSupported] Exit status: 101
[ExtHostShellExec] Sandbox support detected: false
From ~/.config/Cursor/logs/20260307T151135/window1/renderer.log:
[MainThreadShellExec] $updateShellExecCapabilities: ... sandboxSupported=false
Historical comparison (same machine/kernel), from ~/.config/Cursor/logs/20260301T162000/window1/renderer.log:
[MainThreadShellExec] $updateShellExecCapabilities: ... sandboxSupported=true
Additional notes
firejailworks independently on this machine.bubblewrap(/usr/bin/bwrap) is present and executable.- User namespaces are enabled:
kernel.unprivileged_userns_clone = 1user.max_user_namespaces = 126950
- Cursor Linux sandbox prerequisites from docs appear satisfied:
- Kernel >=
6.2is satisfied (6.12.73+deb13-amd64) - Unprivileged user namespaces are enabled
- Kernel >=
- AppArmor packaging/profile state is inconsistent after updates:
dpkg -lshowscursor-sandbox-apparmorin staterc/etc/apparmor.d/cursor-sandboxexists on disk
- This report focuses on Cursor’s internal sandbox helper regression between versions that previously worked and current
2.6.13.
Local resolution (workaround, no downgrade)
The issue was resolved locally without downgrading Cursor by fixing AppArmor rules for Cursor sandbox helpers.
Applied steps:
sudo apt purge -y cursor-sandbox-apparmor
sudo apt install -y cursor-sandbox-apparmor
sudo rm -f /etc/apparmor.d/cursor-sandbox.bak
sudo sed -i 's/^ #userns,/ userns,/g' /etc/apparmor.d/cursor-sandbox /etc/apparmor.d/cursor-sandbox-remote
sudo sed -i '/capability setpcap,/a\ network,' /etc/apparmor.d/cursor-sandbox /etc/apparmor.d/cursor-sandbox-remote
sudo /usr/sbin/apparmor_parser -r /etc/apparmor.d/cursor-sandbox
sudo /usr/sbin/apparmor_parser -r /etc/apparmor.d/cursor-sandbox-remote
sudo systemctl restart apparmor
Validation after restarting Cursor:
- Manual preflight returns
0. - Logs show
sandboxSupported=trueandSandbox support detected: true.
Important:
- These local profile edits may be overwritten by future package updates.