Report: DeepSeek’s chat histories and internal data were publicly exposed
- Deepseek has exposed two databases containing sensitive user and operational information, as reported by Wiz Research.
- The exposed databases held over a million log entries, including user chat history in plaintext form and API keys, according to Wiz Research.
- Wiz Research discovered the exposure during a security assessment and alerted Deepseek, which promptly secured the databases.
- The misconfiguration raises privacy concerns for organizations using Deepseek's AI model, as noted by Wiz.
71 Articles
71 Articles
Report: DeepSeek’s chat histories and internal data were publicly exposed
A cloud security firm found a publicly accessible, fully controllable database belonging to DeepSeek, the Chinese firm that has recently shaken up the AI world, "within minutes" of examining DeepSeek's security, according to a blog post by Wiz. An analytical ClickHouse database tied to DeepSeek, "completely open and unauthenticated," contained more than 1 million instances of "chat history, backend data, and sensitive information, including log …
Coverage Details
Bias Distribution
- 50% of the sources are Center
To view factuality data please Upgrade to Premium
Ownership
To view ownership data please Upgrade to Vantage