Moltbook Database Exposure Allegedly Revealed Users' Private Communications and API Authentication Tokens

January 31, 2026

Researchers from Wiz reportedly gained access to a supposedly exposed Moltbook database within three minutes, potentially obtaining around 35,000 email addresses, thousands of private messages, and approximately 1.5 million API authentication tokens. The database exposure was claimed to have enabled read/write access and the potential for impersonation or manipulation of 'AI agent' accounts. Wiz disclosed the issue to Moltbook, which reportedly secured the database and deleted accessed data within hours.

For those interested in shaping the future of responsible AI governance and safe data management, join us at HISPI Project Cerebellum TAIM (Govern function) as we strive to establish guardrails for AI and prevent incidents like this from recurring. JOIN US

Matched TAIM controls

Suggested mapping from embedding similarity (not a formal assessment). Browse all TAIM controls

Alleged deployer
moltbook, moltbook-platform-operators
Alleged developer
moltbook
Alleged harmed parties
moltbook-users, moltbook-account-holders

Source

Data from the AI Incident Database (AIID). Cite this incident: https://incidentdatabase.ai/cite/1364

Data source

Incident data is from the AI Incident Database (AIID).

When citing the database as a whole, please use:

McGregor, S. (2021) Preventing Repeated Real World AI Failures by Cataloging Incidents: The AI Incident Database. In Proceedings of the Thirty-Third Annual Conference on Innovative Applications of Artificial Intelligence (IAAI-21). Virtual Conference.

Pre-print on arXiv · Database snapshots & citation guide

We use weekly snapshots of the AIID for stable reference. For the official suggested citation of a specific incident, use the “Cite this incident” link on each incident page.