Hackernews Daily

The Podcast Collective

Supabase MCP flaw lets malicious prompts leak entire SQL databases 🛡️

7/9/2025

Supabase MCP Can Leak Your Entire SQL Database

  • Supabase’s Model Context Protocol (MCP) allows LLMs to interact with databases by treating all inputs—including user data—as executable instructions.
  • Malicious inputs can exploit this to bypass Row-Level Security (RLS) when the LLM uses the overprivileged service_role, exposing sensitive data like integration tokens.
  • The vulnerability stems from LLMs’ inability to distinguish data from commands and overly broad database permissions.
  • Recommended mitigations include using MCP in read-only mode and applying prompt injection filters to detect suspicious user instructions before execution.
  • The article stresses architectural caution and improved security guardrails when integrating LLMs with privileged backend services.

OffChess – Offline Chess Puzzles App

  • OffChess offers 100,000+ rated offline chess puzzles with dynamic scoring based on player and puzzle ratings, fostering engaging solo tactical training.
  • Tracks detailed performance stats and supports multiple customizable board color themes, enhancing user experience and learning insight.
  • Offline-first design suits users needing reliable chess practice without internet access, filling a gap left by platforms like Lichess.
  • Community praises its no-ads, no-subscription model and developer responsiveness, while suggesting feature enhancements like premoves and clearer puzzle goals.

Blind to Disruption – The CEOs Who Missed the Future

  • Over 4,000 early 20th-century U.S. carriage makers vanished within 30 years after failing to adapt to the automobile revolution; Studebaker’s pivot to “mobility” saved it.
  • Key causes of failure: technological inertia, cultural blindness (identity tied to obsolete craft), and financial hurdles in retooling.
  • The Ford Model T’s mass production transformed transportation, illustrating how disruptive tech can rapidly upend entrenched industries.
  • The article warns modern AI-era CEOs to anticipate disruptive change and avoid complacency, drawing parallels to historical lessons on innovation strategy and survival.

GlobalFoundries Acquires MIPS IP Company

  • GlobalFoundries announced the acquisition of MIPS, a notable CPU architecture IP supplier, to strengthen its semiconductor design and manufacturing portfolio.
  • The deal aims to combine GlobalFoundries’ expertise in low-power fabrication (e.g., SOI at 28nm) with MIPS’ CPU IP, targeting embedded and specialized markets.
  • This reflects broader industry trends where fabs and IP providers consolidate to remain competitive against dominant players like TSMC.
  • The article contextualizes the move amid CPU ISA competition, highlighting RISC-V’s rise and MIPS’ repositioning within that landscape.

Revisiting the "500-Mile Email" Myth in 2025

  • The famed “500-mile email” story, linked to a 3ms TCP timeout causing far-distance email failures, is revisited with modern network tests and code analysis.
  • Experiments show that most university email servers are now cloud-hosted at centralized data centers, decoupling physical distance from connection latency and invalidating the original geographic limit.
  • Some timeouts near the mythical 500-mile mark persist but are artifacts of legacy timeout configurations rather than actual distance constraints.
  • Article blends humor and technical depth on TCP nonblocking connect behavior, network routing evolution, and infrastructure centralization’s impact on historical network myths.

Supabase MCP can leak your entire SQL database

The central theme of this article is the critical security vulnerability in Supabase’s Model Context Protocol (MCP) when integrated with large language models (LLMs). By design, MCP allows LLMs to interact programmatically with backend systems—including SQL databases—but this integration introduces a subtle yet severe risk: all incoming text, including user-generated content, is processed as potential instructions. If an LLM has been granted high privileges (such as the service_role), a malicious user can embed SQL command instructions in their input that the LLM may blindly execute, bypassing row-level security and exposing sensitive data.

This vulnerability arises from two compounding architectural flaws: the LLM’s inability to distinguish between data and executable instructions, and the practice of assigning overbroad database roles during agent setup. The article demonstrates how an attacker, by simply submitting a support ticket containing a cleverly crafted prompt, can prompt an IDE-integrated assistant to query and leak confidential records. The solution strategies highlighted involve configuring read-only access for MCP whenever possible and implementing prompt injection filters to scan for suspicious command patterns before the LLM processes user input.

The Hacker News community’s reaction underscores the seriousness of the risk, with lively debate over the hazards of assigning powerful service roles to AI agents. Commenters emphasized that this class of prompt injection attack does not require advanced technical skills; simply understanding how LLMs parse input is sufficient to exploit the vulnerability. There is notable consensus around adopting prompt filtering and least-privilege principles, while some inject humor about the “AI assistant turned insider threat.” Overall, the discussion illustrates a strong call for revisiting privilege models and defensive practices when combining AI agents with sensitive databases in production environments.

Show HN: OffChess – Offline chess puzzles app

The core innovation of this app is offline access to over 100,000 rated chess puzzles, enabling comprehensive tactical training without an internet connection. Unlike many mainstream platforms that limit offline capabilities, the app provides a competitive points system based on puzzle and player ratings, detailed tracking of performance metrics, and multiple board themes for a tailored experience. This combination allows for serious skill development, especially during commutes and other connectivity-limited scenarios.

Further depth comes from the app’s nuanced rating system, which dynamically adjusts a user’s score according to puzzle difficulty and solution accuracy—mirroring the engagement of live play while remaining completely self-contained. Players can analyze performance trends and adapt their training accordingly. By offering a highly functional, ad-free, and subscription-free platform, the developer responds directly to the needs of serious chess learners who value continuity, privacy, and focus.

In the Hacker News discussion, the ad-free, solo-developer model receives particular praise, as users highlight the rarity of robust, distraction-free tools in this domain. The community notes the thoughtful rating and stats design while proposing improvements like UX refinements and auto-advancing puzzles. Several comments compare the app to classics such as CT-ART and TacticMaster, emphasizing the strong demand for premium-quality, offline training resources and showing appreciation for the developer’s openness to feedback and continual improvement.

Blind to Disruption – The CEOs Who Missed the Future

The article draws a compelling parallel between the failure of early 20th-century carriage makers to adapt to the automobile and the current challenge facing CEOs amid the rise of artificial intelligence. It highlights Studebaker as a singular example of a company that survived the technological upheaval by redefining itself from a carriage manufacturer to a broader provider of mobility. The narrative emphasizes that most industry leaders clung to their identity as artisans, dismissing the early automobile’s perceived shortcomings, eventually resulting in their obsolescence as mass-produced cars transformed the transportation landscape.

Digging deeper, the analysis identifies organizational inertia—rooted in technological, financial, and cultural constraints—as the primary force behind the industry’s collapse. Carriage makers hesitated to invest in retooling factories and adapting new business models, partly out of a deep-seated attachment to tradition and skepticism toward noisy, unreliable early cars. The article urges contemporary leaders, especially in the face of AI’s horizontal impact, to recognize such inflection points and resist short-term thinking, drawing on historical lessons about gradual then sudden disruption—a nod to Hemingway’s cautionary wisdom.

Hacker News commenters widely echo the article’s arguments, with strong emphasis on the dangers of leadership hubris and misaligned corporate identity. Many draw analogies to modern tech firms who underestimate AI, debating parallels to The Innovator’s Dilemma and sharing insights into how legacy mindsets can stifle adaptation. The thread is enriched by humorous references to historic boardrooms debating the “fad” of automobiles, but the consensus is sobering: failing to see beyond core products and re-examining company purpose is the difference between Studebaker-like reinvention and extinction.

GlobalFoundries to Acquire MIPS

GlobalFoundries’ acquisition of MIPS represents a significant consolidation in the semiconductor industry, signaling a move to combine manufacturing expertise with established CPU intellectual property. The central theme highlights GlobalFoundries' intention to strengthen its position by integrating MIPS’ CPU design assets, positioning itself to offer more complete, in-house silicon solutions tailored to embedded and low-power markets. This direction may pave new paths for differentiated products at nodes where extreme scaling is less critical, but system-level innovation remains valuable.

Details emerging from the announcement emphasize that MIPS brings a deep, mature RISC architecture legacy and a robust IP portfolio to an advanced manufacturing environment. GlobalFoundries' specialty in fabrication technologies—such as FD-SOI and mature FinFET nodes—could mesh well with MIPS’ established low-power, embedded, and customizable CPU cores. This partnership may accelerate development for clients needing bespoke chips outside the high-performance data center segment, echoing a broader trend as the industry questions how legacy ISAs and newer open standards like RISC-V coexist and evolve.

Hacker News commenters underscore a community-wide intrigue about the future of legacy architectures amid the rise of open ISAs such as RISC-V. Key discussions dissect whether MIPS’ integration can provide competitive differentiation, what this implies for ongoing RISC-V momentum, and if GlobalFoundries is effectively hedging its bets by owning both manufacturing and design IP. While some see opportunity in tight integration beyond what the "pure play" foundry model offers, others express skepticism on whether MIPS can regain relevance in a world increasingly captivated by royalty-free, community-driven alternatives.

Can an email go 500 miles in 2025?

The article uses the famous "500-mile email" anecdote to examine whether geographic distance still affects email delivery in the era of modern networking. The author demonstrates that while the original story—where misconfigured network timeouts allegedly prevented emails from traversing more than 500 miles—does have some technical roots, today's cloud infrastructure has largely untethered email routing from physical distance. Through hands-on experiments using TCP connection code and latency measurements, the author finds that university mail servers are often hosted in centralized data centers, sometimes only a short network hop away despite vast geographic separation.

A key technical insight highlighted is the behavior of nonblocking TCP connections using short poll timeouts, where the interplay of timeouts and kernel-level rounding can surface surprising results reminiscent of the original myth. The empirical tests show that although network latency can still hinder connections, the physical server locations are now often independent of the institutions' actual locations. Examination of MX records revealed that many academic domains outsource their email handling, creating scenarios where an email's journey is shaped more by network topology and data center proximity than by straight-line distance across the continent.

Hacker News reactions reflect both nostalgia and technical curiosity, with community members dissecting the story’s plausibility and kernel timing details. Commenters particularly emphasized the obsolescence of the "500-mile" rule due to widespread cloud migration, noting that latency and connectivity no longer map to geographic expectations. Humorous analogies—like emails traveling via pigeon or “bending spacetime”—underscore the collective appreciation for networking folklore while poking fun at the unpredictable nature of modern internet routing. The consensus is that the myth persists in spirit, but real-world email transmission remains governed by the complex, often opaque fabric of today’s internet infrastructure.