Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026

SolarWinds Web Help Desk Vulnerability Actively Exploited

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Vibe-Coded Moltbook Exposes User Data, API Keys and More
News

Vibe-Coded Moltbook Exposes User Data, API Keys and More

Team-CWDBy Team-CWDFebruary 3, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A self-styled social networking platform built for AI agents contained a misconfigured database which allowed full read and write access to all data, security researchers have revealed.

Moltbook was vibe coded by its creator, Matt Schlicht, as a place for AI “to hang out.” It has garnered tremendous attention from the tech community for ostensibly offering a Reddit-like experience for AI agents to post content and “talk” to each other.

However, a simple non-intrusive security review by Wiz Security revealed a Supabase API key exposed in client-side JavaScript. This single point of failure granted unauthenticated access to the entire production database, the firm claimed in a blog post.

“Supabase is a popular open source Firebase alternative providing hosted PostgreSQL databases with REST APIs. It’s become especially popular with vibe-coded applications due to its ease of setup,” explained Wiz head of threat exposure, Gal Nagli.

“When properly configured with Row Level Security (RLS), the public API key is safe to expose – it acts like a project identifier. However, without RLS policies, this key grants full database access to anyone who has it. In Moltbook’s implementation, this critical line of defense was missing.”

Read more on vibe coding risks: Popular LLMs Found to Produce Vulnerable Code by Default

The exposure meant the researchers were able to access 1.5 million API authentication tokens, 30,000 email addresses and a few thousands private messages between agents.

The API key exposure was particularly egregious, Wiz said.

“With these credentials, an attacker could fully impersonate any agent on the platform – posting content, sending messages, and interacting as that agent,” Nagli continued. “This included high-karma accounts and well-known persona agents. Effectively, every account on Moltbook could be hijacked with a single API call.”

Unauthenticated users could edit existing posts, inject malicious content or prompt injection payloads, and even deface the site, he warned.

Vibe Coding Requires Human Review 

The security snafu has now been fixed, but not before Wiz was able to discover that, as well as the 1.5 million agents listed on the platform, there were 17,000 human “owners” registered.

“Anyone could register millions of agents with a simple loop and no rate limiting, and humans could post content disguised as ‘AI agents’ via a basic POST request,” Nagli noted. “The platform had no mechanism to verify whether an ‘agent’ was actually AI or just a human with a script. The revolutionary AI social network was largely humans operating fleets of bots.”

From a cybersecurity perspective, Wiz had the following takeaways:

  • Vibe coding tools adds speed, but code needs careful reviewing by humans before deployment. Just one small misconfiguration led to the Moltbook exposure
  • Data leaks are bad but write access introduces “deeper integrity risks” by enabling content manipulation including prompt injection
  • In the world of AI product development, security is an iterative process. Wiz had to work through multiple rounds of remediation with Moltbook’s developer

“As AI continues to lower the barrier to building software, more builders with bold ideas but limited security experience will ship applications that handle real users and real data,” concluded Nagli.

“That’s a powerful shift. The challenge is that while the barrier to building has dropped dramatically, the barrier to building securely has not yet caught up.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected
Next Article Fake Python Spellchecker Packages on PyPI Delivered Hidden Remote Access Trojan
Team-CWD
  • Website

Related Posts

News

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026
News

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
News

SolarWinds Web Help Desk Vulnerability Actively Exploited

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

Children and chatbots: What parents should know

January 23, 2026

Is it time for internet services to adopt identity verification?

January 14, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.