We pwned X, Vercel, Cursor, and Discord through a supply-chain attack
TL;DR Highlight
Mintlify's AI docs platform had an internal endpoint validation gap that allowed injecting malicious JavaScript into customer domains like discord.com and docs.x.com.
Who Should Read
Security engineers reviewing SaaS platforms with white-label or custom domain features, and frontend security practitioners.
Core Mechanics
- Mintlify hosts documentation for major tech companies (Discord, X, etc.) and allows custom domains — the vulnerability let an attacker inject arbitrary JavaScript into those customer-owned domains.
- The root cause was insufficient validation of internal API endpoints that were accessible with lower privilege levels, allowing content injection that bypassed CSP for affected domains.
- The injected scripts could steal session tokens, perform phishing, or exfiltrate data from users of the affected documentation sites.
- The scope was significant: any visitor to the affected documentation pages (including enterprise customers' internal docs) could have been targeted.
- Mintlify patched the issue after responsible disclosure, but the exploit window is unknown.
Evidence
- The researcher provided a working proof-of-concept showing malicious JS executing on docs.x.com and discord.com domains.
- HN commenters noted this is a common class of vulnerability in white-label SaaS — the aggregation risk of one platform serving many high-value domains.
- Concern was raised about supply chain implications: documentation sites often load third-party analytics, fonts, and chat widgets — an XSS here could pivot to those.
- Several security engineers noted the specific risk of doc site XSS: developers are often logged in to internal tools while reading docs, making session hijacking especially valuable.
How to Apply
- If you use a third-party docs platform (Mintlify, GitBook, ReadMe, Docusaurus hosting), verify that your custom domain isn't vulnerable to content injection via the platform's admin APIs.
- Apply strict CSP headers on your documentation domains — even if you don't control the underlying platform, you can limit what scripts can execute.
- For internal documentation sites: treat them with the same security rigor as your main product — they're often logged into by engineers with broad access.
- Audit your white-label SaaS vendors for the same class of vulnerability — any platform serving your domain is a potential XSS surface if their internal validation is weak.
Code Example
# CSP header example - applied to third-party proxy path
# nginx configuration
location /_mintlify/ {
add_header Content-Security-Policy "default-src 'none'; img-src 'self'; style-src 'self'; script-src 'none'; sandbox;";
proxy_pass https://upstream.mintlify.app;
}
# Block code generation from strings when running Node.js
node --disallow-code-generation-from-strings server.jsTerminology
Related Papers
Show HN: adamsreview – better multi-agent PR reviews for Claude Code
Claude Code에서 최대 7개의 병렬 서브 에이전트가 각각 다른 관점으로 PR을 리뷰하고, 자동 수정까지 해주는 오픈소스 플러그인이다. 기존 /review나 CodeRabbit보다 실제 버그를 더 많이 잡는다고 주장하지만 커뮤니티에서는 복잡도와 실효성에 대한 회의론도 나왔다.
How Fast Does Claude, Acting as a User Space IP Stack, Respond to Pings?
Claude Code에게 IP 패킷을 직접 파싱하고 ICMP echo reply를 구성하도록 시켜서 실제로 ping에 응답하게 만든 실험으로, 'Markdown이 곧 코드이고 LLM이 프로세서'라는 아이디어를 네트워크 스택 수준까지 밀어붙인 재미있는 사례다.
Show HN: Git for AI Agents
AI 코딩 에이전트(Claude Code 등)가 수행한 모든 툴 호출을 자동으로 추적하고, 어떤 프롬프트가 어느 코드 줄을 작성했는지 blame까지 가능한 버전 관리 도구다.
Principles for agent-native CLIs
AI 에이전트가 CLI 도구를 더 잘 사용할 수 있도록 설계하는 원칙들을 정리한 글로, 에이전트가 CLI를 도구로 활용하는 빈도가 높아지면서 이 설계 방식이 실용적으로 중요해지고 있다.
Agent-harness-kit scaffolding for multi-agent workflows (MCP, provider-agnostic)
여러 AI 에이전트가 서로 역할을 나눠 협업할 수 있도록 조율하는 scaffolding 도구로, Vite처럼 설정 없이 빠르게 멀티 에이전트 파이프라인을 구성할 수 있다.
Show HN: Tilde.run – Agent sandbox with a transactional, versioned filesystem
AI 에이전트가 실제 프로덕션 데이터를 건드려도 롤백할 수 있는 격리된 샌드박스 환경을 제공하는 도구로, GitHub/S3/Google Drive를 하나의 버전 관리 파일시스템으로 묶어준다.