{"id":455970,"date":"2026-02-08T07:44:19","date_gmt":"2026-02-08T07:44:19","guid":{"rendered":"https:\/\/www.newsbeep.com\/us\/455970\/"},"modified":"2026-02-08T07:44:19","modified_gmt":"2026-02-08T07:44:19","slug":"moltbook-the-social-network-for-ai-agents-exposed-real-humans-data","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/us\/455970\/","title":{"rendered":"Moltbook, the Social Network for AI Agents, Exposed Real Humans\u2019 Data"},"content":{"rendered":"<p>An analysis by WIRED this week found that ICE and CBP\u2019s face recognition app Mobile Fortify, which is being used to identify people across the United States, <a href=\"https:\/\/www.wired.com\/story\/cbp-ice-dhs-mobile-fortify-face-recognition-verify-identity\/\" rel=\"nofollow noopener\" target=\"_blank\">isn\u2019t actually designed to verify who people are<\/a> and was only approved for Department of Homeland Security use by relaxing some of the agency\u2019s own privacy rules.<\/p>\n<p class=\"paywall\">WIRED took a close look at <a href=\"https:\/\/www.wired.com\/story\/ice-cbp-srt-bortac-units-immigration-operations\/\" rel=\"nofollow noopener\" target=\"_blank\">highly militarized ICE and CBP units<\/a> that use extreme tactics typically seen only in active combat. Two agents involved in the shooting deaths of US citizens in Minneapolis are reportedly members of these paramilitary units. And a new report from the Public Service Alliance this week found that <a href=\"https:\/\/www.wired.com\/story\/how-data-brokers-can-fuel-violence-against-public-servants\/\" rel=\"nofollow noopener\" target=\"_blank\">data brokers can fuel violence against public servants<\/a>, who are facing more and more threats but have few ways to protect their personal information under state privacy laws.<\/p>\n<p class=\"paywall\">Meanwhile, with the Milano Cortina Olympic Games beginning this week, <a href=\"https:\/\/www.wired.com\/story\/ice-and-qatari-security-forces-at-the-winter-olympics-put-italians-on-edge\/\" rel=\"nofollow noopener\" target=\"_blank\">Italians and other spectators are on edge<\/a> as an influx of security personnel\u2014including ICE agents and members of the Qatari Security Forces\u2014descend on the event.<\/p>\n<p class=\"paywall\">And there\u2019s more. Each week, we round up the security and privacy news we didn\u2019t cover in depth ourselves. Click the headlines to read the full stories. And stay safe out there.<\/p>\n<p class=\"paywall\">AI has been touted as a super-powered tool for finding security flaws in code for hackers to exploit or for defenders to fix. For now, one thing is confirmed: AI creates a lot of those hackable bugs itself\u2014including a very bad one revealed this week in the AI-coded social network for AI agents known as <a href=\"https:\/\/www.wired.com\/story\/i-infiltrated-moltbook-ai-only-social-network\/\" rel=\"nofollow noopener\" target=\"_blank\">Moltbook<\/a>.<\/p>\n<p class=\"paywall\">Researchers at the security firm Wiz this week <a data-offer-url=\"https:\/\/www.wiz.io\/blog\/exposed-moltbook-database-reveals-millions-of-api-keys\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.wiz.io\/blog\/exposed-moltbook-database-reveals-millions-of-api-keys&quot;}\" href=\"https:\/\/www.wiz.io\/blog\/exposed-moltbook-database-reveals-millions-of-api-keys\" rel=\"nofollow noopener\" target=\"_blank\">revealed<\/a> that they\u2019d found a serious security flaw in Moltbook, a social network intended to be a Reddit-like platform for AI agents to interact with one another. The mishandling of a private key in the site\u2019s JavaScript code exposed the email addresses of thousands of users along with millions of API credentials, allowing anyone access \u201cthat would allow complete account impersonation of any user on the platform,\u201d as Wiz wrote, along with access to the private communications between AI agents.<\/p>\n<p class=\"paywall\">That security flaw may come as little surprise given that Moltbook was proudly \u201cvibe-coded\u201d by its founder, Matt Schlicht, who has <a data-offer-url=\"https:\/\/x.com\/mattprd\/status\/2017386365756072376?s=46&amp;t=JS55_O2JZmKWQpZHLAse_A\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/x.com\/mattprd\/status\/2017386365756072376?s=46&amp;t=JS55_O2JZmKWQpZHLAse_A&quot;}\" href=\"https:\/\/x.com\/mattprd\/status\/2017386365756072376?s=46&amp;t=JS55_O2JZmKWQpZHLAse_A\" rel=\"nofollow noopener\" target=\"_blank\">stated<\/a> that he \u201cdidn\u2019t write one line of code\u201d himself in creating the site. \u201cI just had a vision for the technical architecture, and AI made it a reality,\u201d he wrote on X.<\/p>\n<p class=\"paywall\">Though Moltbook has now fixed the site\u2019s flaw discovered by Wiz, its critical vulnerability should serve as a cautionary tale about the security of AI-made platforms. The problem often isn\u2019t any security flaw inherent in companies\u2019 implementation of AI. Instead, it\u2019s that these firms are far more likely to let AI write their code\u2014and a lot of AI-generated bugs.<\/p>\n<p class=\"paywall\">The FBI\u2019s raid on Washington Post reporter Hannah Natanson\u2019s home and search of her computers and phone amid its investigation into a federal contractor\u2019s alleged leaks has offered important security lessons in how federal agents can access your devices <a data-offer-url=\"https:\/\/www.yahoo.com\/news\/articles\/washington-post-raid-proves-face-153402560.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAAAb5F4LkISZqUjBlGahzhJ3YejnexZs9gjPUDfzfyaRclt_6v0aG8L9UfRyxgZNQfjqRoXi8RPnPgblW78NK0P6isDlLwHeuFiNF3rSoepHkpg-gXFqYZ3DqgAiWbiU8Ua7ab3qSIYo_BVlgiZpmDjIo1DImf8RksYOd73m3EAZ9\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.yahoo.com\/news\/articles\/washington-post-raid-proves-face-153402560.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAAAb5F4LkISZqUjBlGahzhJ3YejnexZs9gjPUDfzfyaRclt_6v0aG8L9UfRyxgZNQfjqRoXi8RPnPgblW78NK0P6isDlLwHeuFiNF3rSoepHkpg-gXFqYZ3DqgAiWbiU8Ua7ab3qSIYo_BVlgiZpmDjIo1DImf8RksYOd73m3EAZ9&quot;}\" href=\"https:\/\/www.yahoo.com\/news\/articles\/washington-post-raid-proves-face-153402560.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAAAb5F4LkISZqUjBlGahzhJ3YejnexZs9gjPUDfzfyaRclt_6v0aG8L9UfRyxgZNQfjqRoXi8RPnPgblW78NK0P6isDlLwHeuFiNF3rSoepHkpg-gXFqYZ3DqgAiWbiU8Ua7ab3qSIYo_BVlgiZpmDjIo1DImf8RksYOd73m3EAZ9\" rel=\"nofollow noopener\" target=\"_blank\">if you have biometrics enabled<\/a>. It also reveals at least one safeguard that can keep them out of those devices: Apple\u2019s <a href=\"https:\/\/www.wired.com\/story\/apple-lockdown-mode-hands-on\/\" rel=\"nofollow noopener\" target=\"_blank\">Lockdown mode for iOS<\/a>. The feature, designed at least in part to prevent the hacking of iPhones by governments contracting with spyware companies like NSO Group, also kept the FBI out of Natanson\u2019s phone, according to a court filing first reported by 404 Media. \u201cBecause the iPhone was in Lockdown mode, CART could not extract that device,\u201d the filing read, using an acronym for the FBI\u2019s Computer Analysis Response Team. That protection likely resulted from Lockdown mode\u2019s security measure that prevents connection to peripherals\u2014as well as forensic analysis devices like the Graykey or Cellebrite tools used for hacking phones\u2014unless the phone is unlocked.<\/p>\n<p class=\"paywall\">The role of Elon Musk and Starlink in the war in Ukraine has been <a href=\"https:\/\/www.reuters.com\/investigations\/musk-ordered-shutdown-starlink-satellite-service-ukraine-retook-territory-russia-2025-07-25\/\" rel=\"nofollow noopener\" target=\"_blank\">complicated<\/a>, and has not always favored Ukraine in its defense against Russia\u2019s invasion. But Starlink this week gave Ukraine a significant win, disabling the Russian military\u2019s use of Starlink, causing a communications blackout among many of its frontline forces. Russian military bloggers described the measure as a serious problem for Russian troops, in particular for its use of drones. The move reportedly comes after Ukraine\u2019s defense minister wrote to Starlink\u2019s parent company, SpaceX, last month. Now it appears to have responded to that request for help. \u201cThe enemy has not only a problem, the enemy has a catastrophe,\u201d Serhiy Beskrestnov, one of the defense minister\u2019s advisers, wrote on Facebook.<\/p>\n<p class=\"paywall\">In a coordinated digital operation last year, US Cyber Command used digital weapons to disrupt Iran&#8217;s air missile defense systems during the US&#8217;s kinetic attack on Iran&#8217;s nuclear program. The disruption &#8220;helped to prevent Iran from launching surface-to-air missiles at American warplanes,&#8221; according to The Record. US agents reportedly used intelligence from the National Security Agency to find an advantageous weakness in Iran&#8217;s military systems that allowed them to get at the anti-missile defenses without having to directly attack and defeat Iran&#8217;s military digital defenses.<\/p>\n<p class=\"paywall\">\u201cUS Cyber Command was proud to support Operation Midnight Hammer and is fully equipped to execute the orders of the commander-in-chief and the secretary of war at any time and in any place,\u201d a command spokesperson said in a statement to The Record.<\/p>\n","protected":false},"excerpt":{"rendered":"An analysis by WIRED this week found that ICE and CBP\u2019s face recognition app Mobile Fortify, which is&hellip;\n","protected":false},"author":2,"featured_media":455971,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[27],"tags":[517,181,28,7257,11,4002,1206,7270,154032,1208],"class_list":{"0":"post-455970","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"tag-apple","9":"tag-artificial-intelligence","10":"tag-business","11":"tag-cybersecurity","12":"tag-elon-musk","13":"tag-hacking","14":"tag-russia","15":"tag-security","16":"tag-security-roundup","17":"tag-ukraine"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/455970","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/comments?post=455970"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/455970\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media\/455971"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media?parent=455970"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/categories?post=455970"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/tags?post=455970"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}