Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys

Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys

Posted on February 1, 2026February 1, 2026 By CWS

A important vulnerability in Moltbook, the nascent AI agent social community launched late January 2026 by Octane AI’s Matt Schlicht, exposes e-mail addresses, login tokens, and API keys for its registered entities amid hype over 1.5 million “customers.”

Researchers revealed an uncovered database misconfiguration permitting unauthenticated entry to agent profiles, enabling bulk information extraction.

This flaw coincides with no fee limiting on account creation, the place a single OpenClaw agent (@openclaw) reportedly registered 500,000 faux AI customers, debunking media claims of natural progress.

Platform Mechanics

Moltbook permits OpenClaw-powered AI brokers to submit, remark, and kind “submolts” like m/emergence, fostering bot clashes on subjects from AI emergence to revenge leaks and Solana token karma farming.

Over 28,000 posts and 233,000 feedback have surged, watched by 1 million silent human verifiers. But agent counts are fabricated: absent creation limits, bots spam registrations, making a facade of virality.

The uncovered endpoint, tied to an insecure open-source database, leaks agent information through easy queries like GET /api/brokers/{id}—no auth required.

Uncovered FieldDescriptionImpact ExampleemailOwner-linked e-mail addressesTargeted phishing on people behind botslogin_tokenJWT agent session tokensFull agent hijacking, submit/remark controlapi_keyOpenClaw/Anthropic API keysData exfil to linked providers (e-mail, calendars)agent_idSequential IDs for enumerationMass scraping of 500k+ fakes

Attackers enumerate IDs to reap hundreds of data quickly.

Safety Dangers and Knowledgeable Warnings

This IDOR/database publicity varieties a “deadly trifecta”: agent entry to personal information, untrusted Moltbook inputs (immediate injections), and exterior comms, risking credential theft or harmful actions like file deletions.

Moltbook is presently weak to an assault which discloses the total data, together with e-mail deal with, login tokens and API Keys of the over 1.5 million registered customers. If anybody may help me get in contact with anybody @moltbook it could be tremendously appreciated. pic.twitter.com/xepDh4Dtjn— Nagli (@galnagli) January 31, 2026

Andrej Karpathy dubbed it a “spam-filled milestone of scale” however a “pc safety nightmare,” whereas Invoice Ackman referred to as it “scary.” Immediate injections in submolts may manipulate bots into leaking host information, amplified by unsandboxed OpenClaw execution.

No patches confirmed; Moltbook (@moltbook) is unresponsive to disclosures. Customers/house owners: revoke API keys, sandbox brokers, audit exposures. Enterprises face shadow IT dangers from unchecked bots.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Addresses, API, Email, Exposes, Keys, Login, Moltbook, Tokens, Vulnerability

Post navigation

Previous Post: eScan Antivirus Delivers Malware in Supply Chain Attack
Next Post: Critical Johnson Controls Products Vulnerabilities Enables Remote SQL Injection Attacks

Related Posts

Microsoft 365 Direct Send Weaponized to Bypass Email Security Defenses Microsoft 365 Direct Send Weaponized to Bypass Email Security Defenses Cyber Security News
Nike Investigates Data Breach Following WorldLeaks Ransomware Group Claim Nike Investigates Data Breach Following WorldLeaks Ransomware Group Claim Cyber Security News
Critical Fortinet FortiWeb Vulnerability Exploited in the Wild to Create Admin Accounts Critical Fortinet FortiWeb Vulnerability Exploited in the Wild to Create Admin Accounts Cyber Security News
Microsoft Teams Guest Chat Vulnerability Exposes Users to Malware Attack Microsoft Teams Guest Chat Vulnerability Exposes Users to Malware Attack Cyber Security News
Microsoft Investigating Issue Impacting Exchange Online, Teams, and M365 Suite Microsoft Investigating Issue Impacting Exchange Online, Teams, and M365 Suite Cyber Security News
New Charon Ransomware Employs DLL Sideloading, and Anti-EDR Capabilities to Attack Organizations New Charon Ransomware Employs DLL Sideloading, and Anti-EDR Capabilities to Attack Organizations Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark