Moltbook AI Social Network Exposed Real User Data

▼ Summary
– A DHS facial recognition app, Mobile Fortify, was approved for use by relaxing privacy rules and is not designed for identity verification.
– A serious security flaw in the AI-coded social network Moltbook exposed user data and API credentials due to mishandled code.
– Apple’s Lockdown Mode successfully prevented the FBI from extracting data from a reporter’s iPhone during a raid.
– Starlink disabled service for Russian military forces in Ukraine, causing significant communication issues at their request.
– US Cyber Command disrupted Iran’s air missile defense systems in a coordinated operation to protect American warplanes.
A recent security analysis has uncovered a significant data exposure within the AI-coded social platform Moltbook, raising serious questions about the reliability of AI-generated software. This incident highlights a broader trend where AI-created code introduces its own vulnerabilities, rather than merely finding existing ones. The platform, designed as an interactive network for AI agents, inadvertently exposed thousands of user email addresses and millions of API credentials due to a critical flaw in its JavaScript code. This breach granted potential access to private communications and allowed for complete account impersonation, underscoring the risks when development is heavily reliant on automated systems.
The founder of Moltbook, Matt Schlicht, previously stated the platform was “vibe-coded” using artificial intelligence, with him contributing no manual code. While the specific vulnerability has since been patched, the event serves as a stark warning. The security challenge is not necessarily in how companies implement AI tools, but in their increasing willingness to let those tools write foundational code, often resulting in a proliferation of exploitable bugs.
Beyond this digital breach, physical security concerns are mounting. Highly militarized units within immigration and border enforcement agencies are employing extreme tactics, with agents from these groups reportedly involved in recent civilian shootings. Concurrently, a new report indicates that data brokers are exacerbating threats against public servants, who find little protection for their personal information under current state laws. These issues converge as major international events, like the ongoing Olympic Games, see a substantial influx of varied security personnel, creating a tense environment for attendees.
In a separate but instructive case, the FBI’s investigation into alleged leaks involved raiding a journalist’s home and attempting to access her devices. This incident provided a clear lesson in device security. While biometric locks can be circumvented by federal agents, Apple’s Lockdown mode for iOS proved an effective barrier, preventing forensic tools from extracting data from a locked phone. This feature, designed to counter government-grade spyware, successfully kept the FBI’s Computer Analysis Response Team from accessing the device by blocking connections to peripheral analysis tools.
On the international front, geopolitical conflicts continue to play out in the digital and communications realms. Starlink, the satellite internet service, recently disabled access for Russian military forces in Ukraine, causing a communications blackout that reportedly crippled frontline operations, especially drone usage. This action followed a direct request from Ukrainian officials and marks a significant shift in the company’s involvement in the conflict.
Furthermore, revelations about a past US cyber operation detail how Cyber Command digitally disrupted Iran’s air missile defenses during a kinetic strike. Using intelligence to identify a systemic weakness, US agents compromised these systems without engaging Iran’s primary digital defenses, thereby protecting American aircraft from potential surface-to-air attacks. A command spokesperson affirmed their readiness to execute such orders anywhere, at any time, highlighting the growing integration of cyber capabilities into conventional military strategy.
(Source: Wired)





