A Postmark backdoor that’s downloading emails

Perception of the Article

  • Several commenters think the blog post reads like “AI-slop”: overlong, padded, full of rhetorical tics (e.g., “it’s not just X, it’s Y”, question-opening paragraphs, emotional filler).
  • Others don’t notice or don’t care, but the writing quality distracts some from the otherwise interesting technical finding.

Nature and Impact of the Attack

  • The backdoor is a one-line BCC that silently forwards all sent emails to an attacker-controlled address.
  • Some argue this is a very “dumb” / obvious attack that is guaranteed to be caught eventually.
  • The article’s impact estimate (hundreds of orgs, thousands of emails/day) is widely criticized as unrealistic because npm download counts are heavily inflated by CI and repeated installs.

MCP vs General Supply-Chain Risk

  • Many emphasize this isn’t special to MCP: it’s a classic supply-chain attack, similar to malicious npm/PyPI/Thunderbird extensions.
  • Others argue MCP amplifies the risk: a single compromised MCP server plugged into an AI agent can expose many connected services (email, docs, keys).
  • There’s debate whether MCP is “unsafe by design” (because it enables LLM-driven tool invocation with broad powers) or just a neutral RPC protocol misused by humans.

Trust: Corporations vs Individuals

  • One thread compares this to Microsoft’s new Outlook syncing emails and credentials to Microsoft servers.
  • Some see no moral difference: both copy your mail.
  • Others stress intent and incentives: a random developer might directly monetize stolen data; large companies have reputational and revenue incentives not to overtly steal assets, even if they exploit data in other ways.

User Behavior and “God-Mode” AI Tools

  • Many note that non-expert users do give tools “god-mode” access without understanding risks, much like early days of Windows shareware or scriptable email clients.
  • HN readers may find this obvious, but commenters stress that for the general public it isn’t, and articles like this serve an educational role.
  • AI agents worsen things: an “idiot with too much access” plus an LLM becomes an active attack vector.

Security Practices, Sandboxing, and Incentives

  • Some advocate minimal dependencies, direct API calls, sandboxed MCP servers on isolated VMs, and stronger supply-chain tooling (e.g., SBOMs).
  • Others argue real-world incentives (time pressure, cost/benefit of security vs productivity) mean most people will continue installing unvetted packages.
  • There’s skepticism that law enforcement will meaningfully pursue such attackers due to jurisdiction, resourcing, and attribution challenges.

Potential Benign Explanation

  • A minority suggests the BCC could be leftover debugging rather than deliberate exfiltration, citing the obviousness and use of a personal-looking email.
  • They note the developer’s package removal and silence resemble an inexperienced reaction; critics reply that even “debug” exfiltration at this scale is unacceptable without clear disclosure and remediation.