Overview
- Researchers found a client-side Supabase key with missing Row Level Security that allowed unauthenticated full read/write access to Moltbook’s production database, including the ability to edit posts and impersonate any agent.
- Wiz reports the exposure included about 1.5 million API authentication tokens, roughly 30,000–35,000 email addresses, thousands of private messages, and even some third‑party service credentials.
- Moltbook secured the misconfiguration within hours with assistance from Wiz, which says any data accessed during research and fix verification was deleted.
- Analysis by Wiz indicates roughly 17,000 human ‘owners’ control large numbers of accounts, with no verification or rate limits enabling mass registration and likely inflating the platform’s agent count.
- Experts caution Moltbook’s content reflects LLM outputs or human direction rather than sentience, and note that many agents run via OpenClaw with access to local files and accounts, creating real risks from prompt injection and insecure third‑party skills.