We pwned X, Vercel, Cursor, and Discord through a supply-chain attack
Bug bounty payouts and exploit economics
- Many commenters feel $4k–$5k is insultingly low for a vuln that can fully compromise high‑value accounts; some call it “bad PR” and “pathetic” relative to company size and risk.
- Others argue it’s life‑changing money for a teenager and a strong CV signal that can lead to high‑paying jobs.
- Several security professionals note that bug bounties are not priced by worst‑case impact but by market dynamics: XSS generally has little or no grey‑market value compared to long‑lived RCE chains on major platforms.
- There’s debate about whether such underpayment nudges some researchers toward selling or weaponizing vulns instead of disclosing.
Severity and nature of the vulnerability
- Core issue: untrusted SVGs with embedded JS, uploaded via Mintlify, executed in customers’ primary domains (e.g., discord.com), enabling XSS.
- Impact ranges from DOM manipulation and phishing to full account takeover, depending on each site’s auth model (cookies vs localStorage, CSP, CSRF, MFA, separate auth domains).
- Some emphasize that modern mitigations (HttpOnly, CSP, subdomains) can sharply reduce impact; others counter that control of the client session is effectively game‑over in many real deployments.
- There’s confusion between XSS and “RCE”; linked writeups show a separate server‑side RCE on Mintlify itself.
“Supply-chain attack” terminology
- Several argue this is misuse: the bug is in a dependency, not a malicious update inserted into the supply chain.
- Others accept a broader definition: an upstream service (Mintlify) flaw transparently compromising downstream integrators.
Third‑party docs, origins, and mitigations
- Strong criticism of serving third‑party docs from the main domain; many advocate separate domains/subdomains with tight CSP and host‑only cookies.
- Some doc‑platform operators say they intentionally avoid features like inline auth or GitHub‑sync due to inherent security risks, despite customer/SEO pressure.
SVG and document formats as attack surface
- Extensive discussion that SVG is effectively “HTML for images” and dangerous to treat as a simple image.
- Stripping
<script>isn’t enough; event attributes, external references, and nested SVGs can still execute code. - Recommended patterns:
- Prefer
<img src="...">for untrusted SVGs; never inline them. - Use strict CSP (e.g.,
script-src 'none'on SVG endpoints). - Consider server‑side rasterization for user‑uploaded SVGs.
- Sanitization is hard; existing tools are often minifiers, not true sanitizers.
- Prefer
Legality and practice of vulnerability research
- Commenters warn that probing sites without explicit programs (HackerOne/Bugcrowd scopes, VDPs) can trigger legal action even for “white hats.”
- Mention of evolving national laws that explicitly protect good‑faith security research, but coverage is inconsistent.
Security culture and AI/startup criticism
- Some see this as emblematic of “move fast” AI/SaaS culture: flashy marketing and complex infra with weak security fundamentals.
- Others note these mistakes predate AI and stem from long‑standing web‑dev practices (JS dependency sprawl, sloppy multi‑tenant designs, weak cookie scoping).
Value of young researchers
- Many praise the technical skill and initiative of a 16‑year‑old finding this and suggest such people should be hired or sponsored.
- Others note a single prolific bug hunter cannot replace systematic security engineering, pentests, and defense‑in‑depth.