Description: Wiz researchers reported accessing an exposed Moltbook database in under three minutes, allegedly obtaining ~35,000 email addresses, thousands of private DMs, and ~1.5 million API authentication tokens. The exposure was described as enabling read/write access and potential impersonation or manipulation of "AI agent" accounts. Wiz said it disclosed the issue to Moltbook, which reportedly secured the database within hours and deleted accessed data.
Entities
View all entitiesAlleged: Moltbook developed an AI system deployed by Moltbook and Moltbook platform operators, which harmed Moltbook users and Moltbook account holders.
Alleged implicated AI systems: Moltbook , Moltbook database , Moltbook authentication tokens and Moltbook direct messaging system
Incident Stats
Incident ID
1364
Report Count
1
Incident Date
2026-01-31
Editors
Daniel Atherton
Incident Reports
Reports Timeline
Loading...
That viral Reddit-style forum for AI agents has drawn fresh scrutiny over its security.
Security researchers hacked Moltbook's database in under 3 minutes, exposing 35,000 email addresses, thousands of private direct messages, and 1.5 milli…
Variants
A "variant" is an AI incident similar to a known case—it has the same causes, harms, and AI system. Instead of listing it separately, we group it under the first reported incident. Unlike other incidents, variants do not need to have been reported outside the AIID. Learn more from the research paper.
Seen something similar?
Similar Incidents
Did our AI mess up? Flag the unrelated incidents
Similar Incidents
Did our AI mess up? Flag the unrelated incidents

