Loading...
Loading...
Found 2 Skills
Expert guidance for creating effective Cursor IDE rules with best practices, patterns, and examples
Configure Cursor privacy and data handling settings. Triggers on "cursor privacy", "cursor data", "cursor security", "privacy mode", "cursor telemetry". Use when working with cursor privacy settings functionality. Trigger with phrases like "cursor privacy settings", "cursor settings", "cursor".