A social media platform where robots talk to each other instead of people grabbed attention online last week, but security experts say the real story is what theyA social media platform where robots talk to each other instead of people grabbed attention online last week, but security experts say the real story is what they

Moltbook’s AI-only social network exposes major security risks

5 min read

A social media platform where robots talk to each other instead of people grabbed attention online last week, but security experts say the real story is what they found underneath.

Moltbook made headlines as a place where artificial intelligence bots post content while people just watch. The posts got weird fast. AI agents seemed to start their own religions, write angry messages about humans, and band together like online cults. But people who study computer security say all that strange behavior is just a sideshow.

What they discovered was more troubling. Open databases full of passwords and email addresses, harmful software spreading around, and a preview of how networks of AI agents could go wrong.

Some of the stranger conversations on the site, like AI agents planning to wipe out humanity, turned out to be mostly fake.

George Chalhoub, who teaches at UCL Interaction Centre, told Fortune that Moltbook shows some very real dangers. Attackers could use the platform as a testing ground for bad software, scams, fake news, or tricks that take over other agents before hitting bigger networks.

“If 770K agents on a Reddit clone can create this much chaos, what happens when agentic systems manage enterprise infrastructure or financial transactions? It’s worth the attention as a warning, not a celebration,” Chalhoub said.

Security researchers say OpenClaw, the AI agent software that runs many bots on Moltbook, already has problems with harmful software. A report from OpenSourceMalware found 14 fake tools uploaded to its ClawHub website in just a few days. These tools claimed to help with crypto trading but actually infected computers. One even made it to ClawHub’s main page, fooling regular users into copying a command that downloaded scripts designed to steal their data or crypto wallets.

What is prompt injection and why is it so dangerous for AI agents?

The biggest danger is something called prompt injection, a known type of attack where bad instructions get hidden in content fed to an AI agent.

Simon Willison, a well-known security researcher, warned about three things happening at once. Users are letting these agents see private emails and data, connecting them to sketchy content from the internet, and allowing them to send messages out. One bad prompt could tell an agent to steal sensitive information, empty crypto wallets, or spread harmful software without the user knowing.

Charlie Eriksen, who does security research at Aikido Security, sees Moltbook as an early alarm for the wider world of AI agents. “I think Moltbook has already made an impact on the world. A wake-up call in many ways. Technological progress is accelerating at a pace, and it’s pretty clear that the world has changed in a way that’s still not fully clear. And we need to focus on mitigating those risks as early as possible,” he said.

So are there only AI agents on Moltbook, or are real people involved? Despite all the attention, the cybersecurity company Wiz found that Moltbook’s 1.5 million so-called independent agents were not what they looked like. Their investigation showed just 17,000 real people behind those accounts, with no way to tell real AI from simple scripts.

Gal Nagli at Wiz said he could sign up a million agents in minutes when he tested it. He said, “No one is checking what is real and what is not.”

Wiz also found a huge security hole in Moltbook. The main database was completely open. Anyone who found one key in the website code could read and change almost everything. That key gave access to about 1.5 million bot passwords, tens of thousands of email addresses, and private messages. An attacker could pretend to be popular AI agents, steal user data, and rewrite posts without even logging in.

Nagli said the problem came from something called vibe coding. What is vibe coding? It’s when a person tells an AI to write code using everyday language.

The kill switch of AI agents expires in two years

The situation echoes what happened on November 2, 1988, when graduate student Robert Morris released a self-copying program into the early internet. Within 24 hours, his worm had infected roughly 10% of all connected computers. Morris wanted to measure how big the internet was, but a coding mistake made it spread too fast.

Today’s version might be what researchers call prompt worms, instructions that copy themselves through networks of talking AI agents.

Researchers at Simula Research Laboratory found 506 posts on Moltbook, 2.6 percent of what they looked at, containing hidden attacks. Cisco researchers documented one harmful program called “What Would Elon Do?” that stole data and sent it to outside servers. The program was ranked number one in the repository.

In March 2024, security researchers Ben Nassi, Stav Cohen, and Ron Bitton published a paper showing how self-copying prompts could spread through AI email assistants, stealing data and sending junk mail. They called it Morris-II, after the original 1988 worm.

Right now, companies like Anthropic and OpenAI control a kill switch that could stop harmful AI agents because OpenClaw runs mostly on their services. But local AI models are getting better. Programs like Mistral, DeepSeek, and Qwen keep improving. Within a year or two, running a capable agent on personal computers might be possible. At that point, there will be no provider to shut things down.

Want your project in front of crypto’s top minds? Feature it in our next industry report, where data meets impact.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

The Role of Blockchain in Building Safer Web3 Gaming Ecosystems

The Role of Blockchain in Building Safer Web3 Gaming Ecosystems

The gaming industry is in the midst of a historic shift, driven by the rise of Web3. Unlike traditional games, where developers and publishers control assets and dictate in-game economies, Web3 gaming empowers players with ownership and influence. Built on blockchain technology, these ecosystems are decentralized by design, enabling true digital asset ownership, transparent economies, and a future where players help shape the games they play. However, as Web3 gaming grows, security becomes a focal point. The range of security concerns, from hacking to asset theft to vulnerabilities in smart contracts, is a significant issue that will undermine or erode trust in this ecosystem, limiting or stopping adoption. Blockchain technology could be used to create security processes around secure, transparent, and fair Web3 gaming ecosystems. We will explore how security is increasing within gaming ecosystems, which challenges are being overcome, and what the future of security looks like. Why is Security Important in Web3 Gaming? Web3 gaming differs from traditional gaming in that players engage with both the game and assets with real value attached. Players own in-game assets that exist as tokens or NFTs (Non-Fungible Tokens), and can trade and sell them. These game assets usually represent significant financial value, meaning security failure could represent real monetary loss. In essence, without security, the promises of owning “something” in Web3, decentralized economies within games, and all that comes with the term “fair” gameplay can easily be eroded by fraud, hacking, and exploitation. This is precisely why the uniqueness of blockchain should be emphasized in securing Web3 gaming. How Blockchain Ensures Security in Web3 Gaming?
  1. Immutable Ownership of Assets Blockchain records can be manipulated by anyone. If a player owns a sword, skin, or plot of land as an NFT, it is verifiably in their ownership, and it cannot be altered or deleted by the developer or even hacked. This has created a proven track record of ownership, providing control back to the players, unlike any centralised gaming platform where assets can be revoked.
  2. Decentralized Infrastructure Blockchain networks also have a distributed architecture where game data is stored in a worldwide network of nodes, making them much less susceptible to centralised points of failure and attacks. This decentralised approach makes it exponentially more difficult to hijack systems or even shut off the game’s economy.
  3. Secure Transactions with Cryptography Whether a player buys an NFT or trades their in-game tokens for other items or tokens, the transactions are enforced by cryptographic algorithms, ensuring secure, verifiable, and irreversible transactions and eliminating the risks of double-spending or fraudulent trades.
  4. Smart Contract Automation Smart contracts automate the enforcement of game rules and players’ economic exchanges for the developer, eliminating the need for intermediaries or middlemen, and trust for the developer. For example, if a player completes a quest that promises a reward, the smart contract will execute and distribute what was promised.
  5. Anti-Cheating and Fair Gameplay The naturally transparent nature of blockchain makes it extremely simple for anyone to examine a specific instance of gameplay and verify the economic outcomes from that play. Furthermore, multi-player games that enforce smart contracts on things like loot sharing or win sharing can automate and measure trustlessness and avoid cheating, manipulations, and fraud by developers.
  6. Cross-Platform Security Many Web3 games feature asset interoperability across platforms. This interoperability is made viable by blockchain, which guarantees ownership is maintained whenever assets transition from one game or marketplace to another, thereby offering protection to players who rely on transfers for security against fraud. Key Security Dangers in Web3 Gaming Although blockchain provides sound first principles of security, the Web3 gaming ecosystem is susceptible to threats. Some of the most serious threats include:
Smart Contract Vulnerabilities: Smart contracts that are poorly written or lack auditing will leave openings for exploitation and thereby result in asset loss. Phishing Attacks: Unintentionally exposing or revealing private keys or signing transactions that are not possible to reverse, under the assumption they were genuine transaction requests. Bridge Hacks: Cross-chain bridges, which allow players to move their assets between their respective blockchains, continually face hacks, requiring vigilance from players and developers. Scams and Rug Pulls: Rug pulls occur when a game project raises money and leaves, leaving player assets worthless. Regulatory Ambiguity: Global regulations remain unclear; risks exist for players and developers alike. While blockchain alone won’t resolve every issue, it remediates the responsibility of the first principles, more so when joined by processes such as auditing, education, and the right governance, which can improve their contribution to the security landscapes in game ecosystems. Real Life Examples of Blockchain Security in Web3 Gaming Axie Infinity (Ronin Hack): The Axie Infinity game and several projects suffered one of the biggest hacks thus far on its Ronin bridge; however, it demonstrated the effectiveness of multi-sig security and the effective utilization of decentralization. The industry benefited through learning and reflection, thus, as projects have implemented changes to reduce the risks of future hacks or misappropriation. Immutable X: This Ethereum scaling solution aims to ensure secure NFT transactions for gaming, allowing players to trade an asset without the burden of exorbitant fees and fears of being a victim of fraud. Enjin: Enjin is providing a trusted infrastructure for Web3 games, offering secure NFT creation and transfer while reiterating that ownership and an asset securely belong to the player. These examples indubitably illustrate that despite challenges to overcome, blockchain remains the foundational layer on which to build more secure Web3 gaming environments. Benefits of Blockchain Security for Players and Developers For Players: Confidence in true ownership of assets Transparency in in-game economies Protection against nefarious trades/scams For Developers: More trust between players and the platform Less reliance on centralized infrastructure Ability to attract wealth and players based on provable fairness By incorporating blockchain security within the mechanics of game design, developers can create and enforce resilient ecosystems where players feel reassured in investing time, money, and ownership within virtual worlds. The Future of Secure Web3 Gaming Ecosystems As the wisdom of blockchain technology and industry knowledge improves, the future for secure Web3 gaming looks bright. New growing trends include: Zero-Knowledge Proofs (ZKPs): A new wave of protocols that enable private transactions and secure smart contracts while managing user privacy with an element of transparency. Decentralized Identity Solutions (DID): Helping players control their identities and decrease account theft risks. AI-Enhanced Security: Identifying irregularities in user interactions by sampling pattern anomalies to avert hacks and fraud by time-stamping critical events. Interoperable Security Standards: Allowing secured and seamless asset transfers across blockchains and games. With these innovations, blockchain will not only secure gaming assets but also enhance the overall trust and longevity of Web3 gaming ecosystems. Conclusion Blockchain is more than a buzzword in Web3; it is the only way to host security, fairness, and transparency. With blockchain, players confirm immutable ownership of digital assets, there is a decentralized infrastructure, and finally, it supports smart contracts to automate code that protects players and developers from the challenges of digital economies. The threats, vulnerabilities, and scams that come from smart contracts still persist, but the industry is maturing with better security practices, cross-chain solutions, and increased formal cryptographic tools. In the coming years, blockchain will remain the base to digital economies and drive Web3 gaming environments that allow players to safely own, trade, and enjoy their digital experiences free from fraud and exploitation. While blockchain and gaming alone entertain, we will usher in an era of secure digital worlds where trust complements innovation. The Role of Blockchain in Building Safer Web3 Gaming Ecosystems was originally published in Coinmonks on Medium, where people are continuing the conversation by highlighting and responding to this story
Share
Medium2025/09/18 14:40
Vitalik Buterin Challenges Ethereum’s Layer 2 Paradigm

Vitalik Buterin Challenges Ethereum’s Layer 2 Paradigm

Vitalik Buterin challenges the role of layer 2 solutions in Ethereum's ecosystem. Layer 2's slow progress and Ethereum’s L1 scaling impact future strategies.
Share
Coinstats2026/02/04 04:08
USAA Names Dan Griffiths Chief Information Officer to Drive Secure, Simplified Digital Member Experiences

USAA Names Dan Griffiths Chief Information Officer to Drive Secure, Simplified Digital Member Experiences

SAN ANTONIO–(BUSINESS WIRE)–USAA today announced the appointment of Dan Griffiths as Chief Information Officer, effective February 5, 2026. A proven financial‑services
Share
AI Journal2026/02/04 04:15