| ▲ | Illniyar 20 hours ago | |||||||
Nice discovery and writeup. Let alone for a 16 yo!. I've never heard an XSS vulnerability described as a supply-chain attack before though, usually that one is reserved for package managers malicious scripts or companies putting backdoors in hardware. | ||||||||
| ▲ | kenjackson 17 hours ago | parent | next [-] | |||||||
I think you can view it as supply chain as the supply chain is about attacking resources used to infiltrate downstream (or is it upstream? I get which direction I should think this flows). As an end user you can't really mitigate this as the attack happens in the supply chain (Mintlify) and by the time it gets to you it is basically opaque. It's like getting a signed malicious binary. It looks good to you and the trust model (the browser's origin model) seems to indicate all is fine (like the signing on the binary). But because earlier in the supply chain they made a mistake, you are now at risk. Its basically moving an XSS up a level into the "supply chain". | ||||||||
| ||||||||
| ▲ | bink 18 hours ago | parent | prev [-] | |||||||
I think that's misuse of the term as well, but like you said they are only 16. | ||||||||