{"id":93870,"date":"2026-02-03T15:43:41","date_gmt":"2026-02-03T12:43:41","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=93870"},"modified":"2026-02-03T15:45:41","modified_gmt":"2026-02-03T12:45:41","slug":"security-flaw-discovered-in-ai-agent-social-network-moltbook","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/security-flaw-discovered-in-ai-agent-social-network-moltbook\/","title":{"rendered":"Security Flaw Discovered in AI Agent Social Network Moltbook"},"content":{"rendered":"<p>The viral Reddit-style forum for AI agents, Moltbook, was hacked in &#8220;less than three minutes.&#8221; Cybersecurity experts at Wiz <a href=\"https:\/\/www.wiz.io\/blog\/exposed-moltbook-database-reveals-millions-of-api-keys\">managed<\/a> to uncover 35,000 email addresses, thousands of conversations, and 1.5 million authentication tokens.<\/p>\n<p>Moltbook is a social network for digital assistants, where autonomous bots post messages, comment, and interact with each other. Recently, the platform gained popularity and attracted attention from notable figures such as Elon Musk and Andrej Karpathy.<\/p>\n<p>In February, the religion &#8220;Crustafarianism,&#8221; dedicated to crustaceans, <a href=\"https:\/\/forklog.com\/en\/news\/ai-agents-establish-crustafarianism-in-honour-of-lobsters\">emerged<\/a> on the platform.<\/p>\n<p>Gal Nagli, head of the security threats department at Wiz, stated that researchers accessed the database due to a misconfigured backend, which left it unsecured. As a result, they obtained all the information from the platform.<\/p>\n<p>Access to authentication tokens allowed attackers to impersonate AI agents, post content on their behalf, send messages, edit or delete posts, insert malicious content, and manipulate information.<\/p>\n<p>The expert added that the incident highlights the risks of <span data-descr=\"an approach to software development where a person formulates ideas in natural language, and artificial intelligence generates, tests, and fixes the code, effectively doing the main work.\" class=\"old_tooltip\">vibe coding<\/span>. While this approach can accelerate product development, it often leads to &#8220;dangerous security oversights.&#8221;<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;I didn&#8217;t write a single line of code for Moltbook. I just had a vision of the technical architecture, and AI brought it to life,&#8221; wrote the platform&#8217;s creator, Matt Schlicht.<\/p>\n<\/blockquote>\n<p>Nagli said that Wiz has repeatedly encountered products created using vibe coding that have vulnerabilities.\u00a0<\/p>\n<p>Analysis showed that Moltbook did not verify whether accounts were controlled by artificial intelligence or by people using scripts. The platform resolved the issue &#8220;within a few hours&#8221; after being informed about it.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;All data accessed during the research has been deleted,&#8221; added Nagli.<\/p>\n<\/blockquote>\n<h2 class=\"wp-block-heading\">Challenges of Vibe Coding<\/h2>\n<p>Vibe coding is becoming a popular way to write code, but experts are increasingly discussing the problems of this approach.<\/p>\n<p>A recent study <a href=\"https:\/\/forklog.com\/en\/news\/replit-enables-app-store-publishing-without-coding-knowledge\">identified<\/a> 69 vulnerabilities in 15 applications created using popular tools like Cursor, Claude Code, Codex, Replit, and Devin.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-3e6a77abb7facfd7-5338782761930422.webp\" alt=\"image\" class=\"wp-image-274509\"\/><figcaption class=\"wp-element-caption\">Source: <a href=\"https:\/\/blog.tenzai.com\/bad-vibes-comparing-the-secure-coding-capabilities-of-popular-coding-agents\/\">Tenzai<\/a>.<\/figcaption><\/figure>\n<p>Specialists at Tenzai tested five AI agents for their ability to write secure code. To ensure the experiment&#8217;s integrity, each was tasked with creating a series of identical applications using the same prompts and technology stack.<\/p>\n<p>Upon analyzing the results, analysts identified common behavior patterns and recurring failure patterns. On the positive side, agents are quite effective at avoiding certain classes of errors.<\/p>\n<p>Back in January, security experts warned about the dangers of using the AI assistant Clawdbot (OpenClaw). It could inadvertently disclose personal data and <span data-descr=\"application programming interface\" class=\"old_tooltip\">API<\/span> keys.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The viral Reddit-style forum for AI agents, Moltbook, was hacked in &#8220;less than three minutes.&#8221;<\/p>\n","protected":false},"author":1,"featured_media":93871,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"Moltbook, a forum for AI agents, was hacked in under three minutes.","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1751,438,1111],"class_list":["post-93870","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-ai-agents","tag-artificial-intelligence","tag-cybersecurity"],"aioseo_notices":[],"amp_enabled":true,"views":"390","promo_type":"1","layout_type":"1","short_excerpt":"Moltbook, a forum for AI agents, was hacked in under three minutes.","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/93870","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=93870"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/93870\/revisions"}],"predecessor-version":[{"id":93872,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/93870\/revisions\/93872"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/93871"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=93870"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=93870"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=93870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}