Open eliotsykes opened 6 years ago
So according to some reports, Mailgun has been attacked and it involved a client's password reset emails Mailgun were storing (for compliance?) being intercepted. See comments at https://news.ycombinator.com/item?id=16079544
Consider adding guideline that if you use Mandrill (not Mailgun), to set view_content_link to false by default:
view_content_link
set to false to remove content logging for sensitive emails
https://mandrillapp.com/api/docs/messages.JSON.html#method-send
Removed Sendgrid from issue as according to docs on their site they do not log email content: https://sendgrid.com/docs/Classroom/Track/Collecting_Data/is_there_a_way_to_see_the_content_of_transactional_emails_i_send.html
Mail providers (such as Mailgun & Mailchimp) are often setup to track all links in the emails that are sent through their servers.
This means your provider may be logging and building reports for sensitive URLs that could be exploited (e.g. reset password links sent by email, URLs for digital goods and giftcards).
Considerations: