We pwned X, Vercel, Cursor, and Discord through a supply-chain attack

Teen hacker rattles big brands; commenters rage at tiny bounties and risky AI docs

TLDR: A teen found a flaw in an AI docs tool used by big brands that could let bad code run from a single link. Comments erupted over low payouts, blame on the third‑party platform, and whether responsible disclosure beats selling to the dark web.

A 16-year-old bug hunter says he poked at the shiny new AI-powered docs that big names like Discord, X, Vercel, and Cursor use, and found a way to slip naughty code into companies’ help pages with a single click. That set off the comments section like a fire alarm. The loudest chorus: bug bounties are way too low. “Cool bug. Bug bounty money is pathetic,” grumbled one user, while another gasped that $11k is “a tiny amount” for something that could hijack accounts.

Who’s to blame? Some readers pointed at Mintlify — “Sounds like you pwned Mintlify!” — while others called it a supply‑chain fail, since big brands plugged third‑party tech straight into their docs without enough guardrails. The geekiest debate turned into an unexpected art lesson: SVG images (the crisp, scalable kind) can hide scripts. One commenter explained that’s why many sites block them: pretty pictures, messy security. Cue jokes about “one weird trick” guides and “AI docs, human oops.”

As the teen detailed digging through developer tools and a command-line helper to uncover a hidden doorway that fetched files under trusted domains, the ethics got spicy: take the bounty or sell to the dark web? One cynic winked, “Might have got more from the onion.” Others applauded responsible disclosure and leaderboard bragging rights. The vibe: admiration plus anxiety, with a heavy sprinkle of salt.

Key Points

  • The author and friends found critical vulnerabilities in the Mintlify documentation platform.
  • A reported XSS flaw could allow malicious scripts in documentation and credential theft via a single link.
  • Discord migrated its developer documentation to Mintlify and proxied routes to discord.mintlify.app.
  • The /_mintlify/_markdown/_sites endpoint allowed cross-site file fetching without validating the host-subdomain match, but returned only raw markdown.
  • Further investigation leveraged Mintlify’s publicly available CLI (@mintlify/cli) to analyze platform internals.

Hottest takes

"Bug bounty money is pathetic" — normie3000
"Sounds like you pwned Mintlify!" — babelfish
"Might have got more from the onion" — devrupt
Made with <3 by @siedrix and @shesho from CDMX. Powered by Forge&Hive.