I'm surprised we haven't seen more "real" attacks from these sorts of things, maybe it's just bc not very many people are actually running these types of MCPs (fortunately) in production.
Wrote about a similar supabase case [0] a few months ago and it's interesting that despite how well known these attacks feel even the official docs don't call it out [1].
Could be that the people most likely to mainline MCP hype with full RW permissions are the least likely to have any auditing controls to detect the intrusion.
There's no incentive for companies who've been victimized to publish news that their software has been exploited, so you kind of have to wait for people to be caught and go through the courts.
Wrote about a similar supabase case [0] a few months ago and it's interesting that despite how well known these attacks feel even the official docs don't call it out [1].
[0] https://blog.sshh.io/i/161242947/mcp-allows-for-more-powerfu... [1] https://supabase.com/docs/guides/getting-started/mcp