How we hacked McKinsey's AI platform

Vulnerability and Impact

  • Public API had hundreds of endpoints; ~22 lacked authentication, including ones touching the production database.
  • Core bug was conventional SQL injection: values were parameterized, but JSON field names were concatenated into SQL queries.
  • Result: unauthenticated read/write access to the database, including tens of millions of chat messages and hundreds of thousands of internal files.
  • Several commenters stress how catastrophic the data exposure is (strategy, M&A, client work, internal research), and assume sophisticated actors may already have exploited it.
  • Others note the especially dangerous aspect: write access to system prompts, enabling silent poisoning of AI behavior without normal deployment controls.

Use of AI Agents and Writing Style

  • Many see the “AI agent hacked McKinsey” angle as more marketing than substance: the core issue was a basic web security failure found by an automated scan.
  • Several complain the blog post reads like generic LLM output: punchy, “LinkedIn-style,” repetitive.
  • Some argue AI writing initially feels high quality but becomes grating due to sameness; others say it’s fine for corporate blogs and not worth getting upset about.

McKinsey’s Tech Competence and Internal Culture

  • Multiple commenters dispute the article’s framing of McKinsey as having “world-class technology teams,” saying tech work is often outsourced or low-status.
  • Insider-style comments describe Lilli as originally internal-only, with strong access controls, and suggest cultural issues:
    • Internal projects penalized vs. client work.
    • Products driven by partners’ short-term incentives, then abandoned.
    • Tech staff treated as second-class and many laid off, degrading in-house expertise.
  • Some conclude this shows McKinsey should not be trusted to advise on AI or tech org design, though others separate their analytical strengths from implementation weaknesses.

Consulting Dynamics and Ethics

  • Discussion reiterates common critiques of big consultancies:
    • Hired to legitimize decisions already made and provide political cover or a scapegoat.
    • Over-promise, under-deliver, but remain lucrative.
  • Some object to using a “whitehat” finding so prominently as marketing.
  • There is skepticism about the new security company’s obscurity, but links to external reporting and a disclosure timeline reassure some that McKinsey acknowledged and fixed the issues.

Broader AI & Security Takeaways

  • Commenters note how AI agents can rapidly map attack surfaces and probe every parameter, making subtle mistakes (like unsafe key concatenation) easier to exploit.
  • Several predict growing demand for continuous, automated security testing of AI-driven systems and automation-heavy internal tools.