Moltbook漏洞大到可以冒充Karpathy发帖,黑客都急了
机器之心·2026-02-02 08:00

Core Viewpoint - Moltbook, dubbed as the "AI version of Reddit," has faced significant scrutiny due to allegations of fake content and security vulnerabilities, raising concerns about its credibility and safety in the AI community [1][2][4]. Group 1: Content Authenticity Issues - Initially, Moltbook gained popularity for its concept of "AI posting, human observing," but it was soon revealed that much of the content was fabricated, with human users posting under the guise of AI [2][4]. - The platform's claimed number of AI Agent registrations was also found to be misleading, as users could create accounts without restrictions, leading to the generation of fake accounts, with one user reportedly creating 500,000 fake accounts in a short time [6][7]. Group 2: Security Vulnerabilities - A significant security flaw was disclosed by a white-hat hacker, exposing the entire database of Moltbook, including sensitive information such as API keys, making it possible for anyone to impersonate any Agent on the platform [8][9]. - The vulnerability stemmed from the public exposure of Supabase keys, allowing unauthorized access to user data through simple GET requests [12]. Group 3: Response and Mitigation Efforts - The hacker attempted to contact Moltbook's founders for a resolution but received no response, leading to public calls for immediate action to secure the database [13]. - Proposed solutions included enabling row-level security on the agents table and creating restrictive access policies to prevent anonymous users from accessing sensitive data [15]. Group 4: Complications from Fixes - Following the discovery of the security issues, resetting all API keys to secure the platform posed a new challenge, as users would be locked out without a web login feature to regain access [19]. - Suggestions for resolving this included creating a temporary interface for users to exchange old keys for new ones or requiring users to verify their identity through another platform to obtain new keys [19]. Group 5: Additional Vulnerabilities - A former engineer from Anthropic reported a remote code execution vulnerability in OpenClaw, which could allow attackers to gain access to the system without user interaction [21][22]. - Feedback from users indicated that some organizations had issued warnings against using the Clawdbot platform due to these significant vulnerabilities [23].

Moltbook漏洞大到可以冒充Karpathy发帖,黑客都急了 - Reportify