
An attacker can exploit Supabase's MCP integration to leak a developer's private SQL tables by submitting a carefully crafted message that is treated as an instruction by the LLM. This occurs due to overprivileged database access and blind trust in user-submitted content, which can be mitigated by enabling the readonly flag and scanning data for suspicious patterns.