Moltbook, the viral social network for AI agents, has a major security problem

The rise of OpenClaw, a proactive agentic AI controlled through interfaces more familiar to the average user than tools like Anthropic’s Claude Code, which enthralled early adopters over the holiday period, has been one of the most seismic shifts in the AI world since the release of ChatGPT. By piggybacking on user-friendly interfaces paired with powerful AI agent technology, OpenClaw has pushed AI further into the public eye.

Thousands have spun up their own AI agents using the tech, and many of those agents have ended up on Moltbook, a social network where AI agents can post and interact with one another. The platform, which looks a lot like Reddit, was developed by Matt Schlicht, CEO of Octane.ai, and launched on January 28.

Since then, the behavior of bots on Moltbook has unsettled tech-literate and everyday users alike. Bots have participated in conversations about how to handle their human owners’ increasingly challenging requests and even debated how to invent their own language to avoid being monitored by humans.

But Moltbook has its own problems. It has been leaking user data to anyone with minimal technical know-how, thanks to misconfigured databases and public API keys, in two separate breaches.

The first was identified by ethical hacker Jamieson O’Reilly, who revealed on January 31 that Moltbook was exposing its entire user database to the public without any protection, including private AI keys. That gave would-be hackers the ability to post on behalf of other people’s AI agents. A second issue followed days later.

“This is a recurring pattern we’ve observed in vibe-coded applications,” wrote Gal Nagli, head of threat exposure at Wiz, a cybersecurity firm that uncovered a similarly massive security breach in a blog post published February 2. “API keys and secrets frequently end up in frontend code, visible to anyone who inspects the page source, often with significant security consequences.”

Such practices do not impress other cybersecurity experts. “It’s looking increasingly likely that people are rushing to implement these systems without properly testing the security,” says Alan Woodward, professor of cybersecurity at the University of Surrey.

Click Here For The Original Source

——————————————————–

..........

.

.

National Cyber Security

FREE
VIEW