[launch] 6 min · Mar 31, 2026

Cursor Automations — Your CI/CD Pipeline Didn't Sign Up for This

Cursor launched event-driven background agents in March 2026. Combined with Self-Hosted Cloud Agents and $2B ARR, this is no longer an IDE story.

#ai-agents#developer-tools#agentic-infrastructure#cursor

Cursor shipped Automations on March 5 — event-driven background agents that wake up when a Slack message arrives, a GitHub PR opens, a Linear issue is filed, or PagerDuty fires an incident. Three weeks later, on March 25, they added Self-Hosted Cloud Agents, keeping code and tool execution inside your own network. Sandwiched between those two releases: a Bloomberg report confirming Cursor’s ARR crossed $2B in February, doubled from roughly $1B in November 2025. This is not an IDE story anymore. Cursor is building an agent orchestration platform, and your CI/CD pipeline is now in its territory.

TL;DR

  • What: Cursor Automations — always-on agents triggered by Slack, GitHub, Linear, PagerDuty, timers, or webhooks (launched March 5)
  • Scale: Cursor estimates hundreds of Automations running per hour across its user base
  • Platform pivot: JetBrains ACP support (March 4) + Self-Hosted Cloud Agents (March 25) + $2B ARR = deliberate orchestration play
  • Action: Evaluate before your ops team discovers it first — the security and trust questions are wide open

Cursor Automations — What Happened

The Automations feature launches agents inside the Cursor standalone IDE, but the triggers are external: Slack messages, GitHub PRs, Linear issues, PagerDuty incidents, custom webhooks, and timers. A documented example is PagerDuty incident response — an alert fires, an agent starts querying server logs via MCP automatically, without a human typing a prompt. Cursor estimates hundreds of these Automations run per hour across their user base. That number implies this is already operational for real teams, not just early adopters stress-testing a beta.

Two days before Automations launched, Cursor announced support for JetBrains IDEs via the Agent Client Protocol on March 4 — IntelliJ IDEA, PyCharm, WebStorm, and the rest of the family. Then on March 25 came Self-Hosted Cloud Agents: code and tool execution stays entirely in your network. The sequence matters. Multi-IDE expansion, then Automations, then data sovereignty controls — that’s a platform architecture rollout, not a feature sprint.

Why This Matters

The obvious comparison is GitHub Actions. Both are event-triggered systems that respond to repository events and run code. The critical difference: GitHub Actions runs deterministic scripts. Cursor Automations runs LLM agents. An agent deciding what to do next based on context is not the same thing as a yaml workflow executing step 3 after step 2 passes. That gap is where things get interesting — and where things get dangerous.

The PagerDuty example is worth taking seriously. An incident fires at 3am. An agent reads the alert, queries your server logs through an MCP connection, and presumably takes some action or produces some output. No human approved that sequence. The agent inferred what “respond to this incident” means. In a well-defined environment with tightly scoped MCP tools, that might be fine. In a sprawling codebase with broad permissions, the blast radius of a wrong inference is non-trivial.

Always-on agents triggered by external messages mean your attack surface is always on. A prompt injection via a crafted Slack message — from an external user, a compromised integration, or a careless internal message — could instruct an agent to run arbitrary commands on your codebase. Cursor has not published a threat model for Automations. That absence should factor into your evaluation.

Self-Hosted Cloud Agents address one legitimate concern: data sovereignty. If your security policy prohibits code leaving your network, cloud-hosted agent execution was a blocker. Self-hosting removes that specific blocker. It does not address execution trust — the question of whether you trust an LLM to make the right call autonomously, without review, on a live codebase. Those are separate problems, and Cursor has solved one of them.

The JetBrains expansion changes the lock-in calculus. Cursor is no longer a bet on VS Code-compatible developers. If your team runs IntelliJ and PyCharm, Automations is now in reach without migrating editors. That’s a deliberate move to maximize addressable accounts before a competitor ships a comparable event-driven agent layer. OpenAI’s agent orchestration approach is moving in the same direction from a different starting point; Cursor’s advantage is that it already has the editor context and the MCP integrations.

The overlap with existing tools is real and worth mapping before you adopt. Automations that auto-fix lint errors compete with your pre-commit hooks and CI linters. Auto-generated PRs in response to Linear issues overlap with tools like Sweep or your existing GitHub Actions workflows. Auto-incident response overlaps with PagerDuty’s own runbook automations. None of this makes Cursor Automations redundant, but it means adoption without audit creates duplication — and worse, competing automations that interfere with each other.

The $2B ARR figure matters beyond bragging rights. Cursor is no longer a VC experiment that might pivot or shut down in eighteen months. At that revenue trajectory, there is now real lock-in gravity. Teams that build Automations workflows, MCP integrations, and prompt libraries inside Cursor are making a durable infrastructure bet. The risk profile of adopting Cursor has changed — both the upside (it’s not going away) and the downside (switching costs are real).

The distinction between agents and automation is worth being precise about here. Our conceptual breakdown of agents vs automation draws the line at decision-making under uncertainty — automation executes known steps, agents infer the next step from context. Automations sits firmly on the agent side of that line. That’s what makes the PagerDuty example striking and the security questions serious. This is not cron jobs with better marketing.

The Take

I’ll be direct: I would not deploy Automations on a production codebase today without a specific trust boundary in place.

The appeal is obvious. An agent that wakes up when PagerDuty fires, reads the logs, and drafts a fix — that’s genuinely valuable if it works. The problem is the “if it works” isn’t binary. LLMs don’t fail in predictable ways. A script either runs or it doesn’t. An agent might do most of what you wanted, plus one thing you didn’t anticipate, in a codebase path you forgot to account for. At 3am. Without anyone watching.

You’re no longer writing code — you’re writing triggers for agents that write code. CI/CD doesn’t hallucinate.

Self-Hosted Cloud Agents solve the data residency problem for regulated industries. That’s a real unlock. But the execution trust problem — do I trust this agent’s judgment on my live codebase, unsupervised, in response to external inputs I don’t fully control — remains open. Cursor hasn’t published a threat model. There’s no documented blast radius analysis. The permission scoping available through MCP helps, but it requires deliberate configuration that most teams will not do by default.

What I’d actually recommend: use Automations in sandboxed, low-stakes contexts first. Auto-generate draft PRs for Linear tickets in a non-production repository. Let an agent triage issues and add labels. These are recoverable failures. Build intuition for where the agent’s judgment holds before you point it at incident response on your production database.

The platform story is real — Cursor has executed a coherent expansion from editor to orchestration layer in a few weeks, with the revenue to sustain it. Against Windsurf and against Claude Code, Cursor now has a structural advantage in the “how much of your workflow can one platform own” conversation. That’s worth tracking even if you’re not ready to adopt Automations today.

The question isn’t whether event-driven agents are the future of developer workflows. They probably are. The question is whether Cursor has shipped the trust primitives that make running them safely practical — and right now, the honest answer is: partially.