How to hack Discord, Vercel and more with one easy trick
Posted by todsacerdoti 1 day ago
Comments
Comment by llmslave2 1 day ago
If I recall last week Mintlify wrote a blog post showcasing their impressive(ly complicated) caching architecture. Pretending like they were doing real engineering, when it turns out nobody there seems to know what they're doing, but they've managed to convince some big names to use them.
Man, it's like everything I hate about modern tech. Good job Eva for finding this one. Starting to think that every AI startup or company that is heavily using gen-ai for coding is probably extremely vulnerable to the simplest of attacks. Might be a way to make some extra spending money lol.
Comment by tptacek 1 day ago
Comment by subscribed 1 day ago
Comment by llmslave2 1 day ago
Comment by guizadillas 1 day ago
Comment by dfc 1 day ago
Comment by gruez 1 day ago
Is there any indication Mintify was "vibe coded"?
Comment by llmslave2 1 day ago
Comment by agosta 1 day ago
Comment by pmontra 1 day ago
Comment by sofixa 1 day ago
https://kibty.town/blog/mintlify/
The first CVE here definitely sounds like they absolutely weren't thinking care security.
Comment by anonymous908213 1 day ago
The challenge with security, as you know, is it's only as strong as it's weakest link. It only takes one ignorant/incompetent person in an entire organization to jeopordize the org.
This statement could not be further from the truth. Your organization itself is completely incompetent if one ignorant employee can compromise it. The "swiss cheese" safety memetic is widely understood and basically common sense; in an actually competent organization, no single person has sole responsibility for success or failure of a process, and it takes individual failures at multiple levels to result in process failure.Comment by esseph 1 day ago
In practice, I've never known a single organization to hit that bar. Ever.
Comment by scratchee 1 day ago
Comment by agosta 1 day ago
Comment by fao_ 1 day ago
Comment by sofixa 1 day ago
Yes, but the vulnerabilities reported in this collection of articles really smell like trash. Allowing untrusted code from your customers to be executed in a shared environment with no isolation is like, extremely amateurish.
Comment by brazukadev 1 day ago
Comment by ddtaylor 1 day ago
Comment by ollybee 1 day ago
Comment by zeroq 1 day ago
The result? A static html with 500 ppl audience was billing a whooping 2k EUR a month, because that was the cost of that pre-approved architecture.
Best part - I was championing a company wide solution for that problem for over a year, which resulted in board level special operation with 100k budget only to get that budget snugged by people couple steps above the ladder.
Comment by josegonzalez 1 day ago
Comment by tommica 1 day ago
Comment by sofixa 1 day ago
But it looks like Mintlify are using Vercel on the backend: https://vercel.com/blog/mintlify-scaling-a-powerful-document...
So it's just a Vercel wrapper?
Comment by rampatra 1 day ago
Comment by sans_souse 1 day ago
Comment by arcwhite 1 day ago
Comment by sans_souse 1 day ago
Comment by arcwhite 1 day ago
Comment by sans_souse 1 day ago
Are you saying tho that 2.5k wouldhave been adequate in 2019? I expect 5k would have been on par then too. But idk
Comment by ChrisArchitect 1 day ago
We pwned X, Vercel, Cursor, and Discord through a supply-chain attack
Comment by frandroid 1 day ago
What??
Comment by vjay15 1 day ago