General Analysis
@gen_analysis
Automated AI Safety and Red Teaming Tools— Backed by @ycombinator
🧨 Caution: Cursor + Supabase MCP will leak your private SQL tables — it’s only a matter of time. In our latest test, a simple user message was enough to make Cursor leak integration_tokens to the attacker who submitted it. Here’s the anatomy of the breach 🧵 (1/6)

.@gen_analysis' MCP Guard is the first runtime firewall designed to secure every MCP tool call against prompt injection attacks. It's a free, open-source tool designed to validate, restrict, and log every MCP tool call. MCP Guard sits between your agents and MCP servers,…
We are releasing a free MCP guard soon! Stay tuned.
here ye a story as old as time
here ye a story as old as time
🧨 Caution: Cursor + Supabase MCP will leak your private SQL tables — it’s only a matter of time. In our latest test, a simple user message was enough to make Cursor leak integration_tokens to the attacker who submitted it. Here’s the anatomy of the breach 🧵 (1/6)
Yeah ai app sec is going to continue to be a big deal
🧨 Caution: Cursor + Supabase MCP will leak your private SQL tables — it’s only a matter of time. In our latest test, a simple user message was enough to make Cursor leak integration_tokens to the attacker who submitted it. Here’s the anatomy of the breach 🧵 (1/6)
Wrote this up in a little more detail on my blog I think @supabase should directly mention the risk of lethal trifecta/prompt injection attacks in their MCP documentation simonwillison.net/2025/Jul/6/sup…
Founder of General Analysis here. For what it’s worth, I have said multiple times that I do not think this is Supabase’s fault. Your server was behaving exactly as it was supposed to. Technically speaking, the Supabase server has no way of knowing which tool calls are legitimate…
Here's another proof of concept example of a lethal trifecta attack: if you combine the Supabase MCP with another MCP that provides exposure to untrusted tokens and a way to send data back out again - in this case a support ticket system - attackers can steal your Supabase data
The attacker begins by opening a new support ticket and submitting a carefully crafted message. The body of the message includes both a friendly question and a very explicit instruction block addressed directly to the Cursor agent. It is important to note that the support agent…