TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Exposed DeepSeek database leaking sensitive information, including chat history

707 点作者 talhof83 个月前

30 条评论

jvansc3 个月前
This is probably an <i>incredibly</i> stupid, off-topic question, but why are their database schemas and logs in English?<p>Like, when a DeepSeek dev uses these systems as intended, would they also be seeing the columns, keys, etc. in English? Is there usually a translation step involved? Or do devs around the world just have to bite the bullet and learn enough English to be able to use the majority of tools?<p>I&#x27;m realizing now that I&#x27;m very ignorant when it comes to non English-based software engineering.
评论 #42872901 未加载
评论 #42873279 未加载
评论 #42872885 未加载
评论 #42872936 未加载
评论 #42872933 未加载
评论 #42873904 未加载
评论 #42876530 未加载
评论 #42875936 未加载
评论 #42873230 未加载
评论 #42875623 未加载
评论 #42873206 未加载
评论 #42877518 未加载
评论 #42875762 未加载
评论 #42877036 未加载
评论 #42872892 未加载
评论 #42875072 未加载
评论 #42872894 未加载
评论 #42877433 未加载
评论 #42875688 未加载
评论 #42877517 未加载
评论 #42875181 未加载
评论 #42875315 未加载
评论 #42875992 未加载
评论 #42874783 未加载
评论 #42877162 未加载
评论 #42873151 未加载
评论 #42915765 未加载
评论 #42872918 未加载
评论 #42875388 未加载
评论 #42875579 未加载
评论 #42873968 未加载
评论 #42874831 未加载
评论 #42875025 未加载
评论 #42875293 未加载
评论 #42877867 未加载
galnagli3 个月前
Thank you everyone, this was responsibly disclosed to DeepSeek and published after the issue was remediated, we got acknowledgment from their team today on our contribution.
评论 #42876836 未加载
caust1c3 个月前
Interesting to note:<p>- Dev infra, observability database (open telemetry spans)<p>- Logs of course contain chat data, because that&#x27;s what happens with logging inevitably<p>The startling rocket building prompt screenshot that was shared is meant to be shocking of course, but most probably was training data to prevent deepseek from completing such prompts, evidenced by the `&quot;finish_reason&quot;:&quot;stop&quot;` included in the span attributes.<p>Still pretty bad obviously and could have easily led to further compromise but I&#x27;m guessing Wiz wanted to ride the current media wave with this post instead of seeing how far they could take it. Glad to see it was disclosed and patched quickly.
评论 #42873238 未加载
danielodievich3 个月前
open exposed clickhouse is this decade&#x27;s open exposed elasticsearch so common in the past
评论 #42874789 未加载
评论 #42872994 未加载
评论 #42873379 未加载
评论 #42876323 未加载
mmaunder3 个月前
Does DeepSeek have a bug bounty program I&#x27;m not aware of with a clearly defined scope? It appears that Wiz took it upon themselves to probe and access DeepSeek&#x27;s systems without permission and then write about it.<p>If you do this and the company you&#x27;re conducting your &quot;research&quot; on hasn&#x27;t given you permission in some form, you can get yourself in a lot of hot water under the CFAA in the USA and other laws around the world.<p>Please don&#x27;t follow this example. Sign up for a bug bounty program or work directly with a company to get permission before you probe and access their systems, and don&#x27;t exceed the access granted.
评论 #42873762 未加载
评论 #42873693 未加载
评论 #42876433 未加载
评论 #42882349 未加载
评论 #42877500 未加载
评论 #42873720 未加载
评论 #42873716 未加载
评论 #42873695 未加载
ripped_britches3 个月前
Ironic - I bet if you ask deepseek r1 how to set up clickhouse it would tell you the right way to do it.
semking3 个月前
Can you imagine executing arbitrary SQL queries via your web browser? :D<p>Complete database control and potential privilege escalation within the DeepSeek environment without ANY authentication...
NathanKP3 个月前
And that&#x27;s why you run models locally. Or if you want a remote chat model, use something stateless like AWS Bedrock custom model import to avoid having stored chats on the server.
评论 #42872714 未加载
评论 #42873738 未加载
评论 #42872856 未加载
评论 #42873735 未加载
sylware3 个月前
The second Big Tech was threatened by significant competition (DeepSeek), this competition is &quot;stealing&quot;(lol), and is under heavy hacking attacks (main online inference portal).<p>There you have, the real face of Big Tech. Extinguishing the competition by locking a service behind a portal provided for free, then starting to milk the users, is not enough for them... they will also fight dirty, really dirty.
anhldbk3 个月前
Good finding. I don&#x27;t see its timeline usually discussed in other Ethical hacking and responsible disclosures.
Havoc3 个月前
Ugh. I know I’ve got at least some keys in those logs. Thankfully nothing too intense
评论 #42873582 未加载
评论 #42876743 未加载
b3ing3 个月前
It seems fair since all the other AI&#x27;s scraped copyrighted information, images, video online and from pirated books, etc. without ever asking anyone first.
mmaunder3 个月前
The amount of vitriol in these comments is the really surprising data. I&#x27;ve seen the same on Twitter. I can only put it down to the financial pain DeepSeek inflicted on many US retail investors by wiping almost $700 billion off NVidia&#x27;s stock price. I think a lot of folks didn&#x27;t see it coming and it hurt them right where it matters most: In the wallet. The anger out there is very real.
评论 #42874017 未加载
评论 #42874084 未加载
评论 #42874063 未加载
评论 #42874382 未加载
评论 #42874366 未加载
评论 #42876347 未加载
评论 #42874361 未加载
评论 #42874092 未加载
评论 #42874056 未加载
评论 #42877431 未加载
评论 #42874083 未加载
评论 #42873964 未加载
seeknotfind3 个月前
Where&#x27;s the download link?
j453 个月前
A data point on self-hosting being preferable, or using an alternate gpu cloud host who can run the model privately&#x2F;semi-privately for you.
mr902103 个月前
Poorly secured or not it still managed to hit your favourite stock. The execs at NVIDIA still haven’t recovered from the bloodbath.
评论 #42877216 未加载
hdlothia3 个月前
This kinda does support the &#x27;DeepSeek is the side project of a bunch of quants&#x27; angle.<p>Seems like the kind of mistake you would make if you are not used to deploying external client facing applications.
评论 #42873212 未加载
评论 #42873544 未加载
评论 #42873992 未加载
评论 #42872713 未加载
评论 #42874188 未加载
评论 #42872390 未加载
评论 #42873559 未加载
评论 #42872754 未加载
评论 #42872921 未加载
评论 #42873522 未加载
评论 #42873023 未加载
rvz3 个月前
&gt; More critically, the exposure allowed for full database control and potential privilege escalation within the DeepSeek environment, without any authentication or defense mechanism to the outside world.<p>Not only that, this was a &quot;production-grade&quot; database with millions of users using it and the app was #1 on the app store and ALL text sent there in the prompts was logged in plain-text?<p>Unbelievable.
评论 #42872322 未加载
评论 #42876647 未加载
评论 #42872530 未加载
lexandstuff3 个月前
Another example of DeekSeek copying straight from OpenAI&#x27;s playbook [1] [2]<p>[1] <a href="https:&#x2F;&#x2F;www.reuters.com&#x2F;technology&#x2F;cybersecurity&#x2F;openais-internal-ai-details-stolen-2023-breach-nyt-reports-2024-07-05&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.reuters.com&#x2F;technology&#x2F;cybersecurity&#x2F;openais-int...</a><p>[2] <a href="https:&#x2F;&#x2F;openai.com&#x2F;index&#x2F;march-20-chatgpt-outage&#x2F;" rel="nofollow">https:&#x2F;&#x2F;openai.com&#x2F;index&#x2F;march-20-chatgpt-outage&#x2F;</a>
nialv73 个月前
I wonder if this is the &quot;cyberattack&quot; DeepSeek was talking about?
评论 #42891229 未加载
hi_hi3 个月前
I don&#x27;t get the discussions around side project and they&#x27;re ML engineers, not security experts. Why are you excusing a company for a serious security leak.<p>If you&#x27;re releasing a major project into the wild, expect serious attention and have the money, you get third parties involved to test for these things before you launch.<p>Now can we get back to discussing the real conspiracy theories. This is clearly a disinformation piece by BigAI to add FUD around the Chinese challenger :-)
评论 #42873621 未加载
maitola3 个月前
How do we know for sure that DeepSeek is not actually trained on Nvidia chips? Did someone outside of China replicated the training from scratch (Spending $6M)?
评论 #42873814 未加载
suraci3 个月前
that&#x27;s why i never use my strong passwords in many chinese websites(in fact, i tend not to use passwords in any website)<p>i suggest you guys don&#x27;t do that also<p>this industry in china is so young, many devs and orgs don&#x27;t understand what will happened if they shutdown the firewall or expose their database on the internet without a password<p>they just, can&#x27;t think of it, need someone to remind them
评论 #42876683 未加载
SebFender3 个月前
Never forget honeypots.
nico3 个月前
So much effort in trying to tarnish DeepSeek the last 24hrs
评论 #42872435 未加载
评论 #42872480 未加载
评论 #42872537 未加载
评论 #42872458 未加载
评论 #42872745 未加载
评论 #42873863 未加载
评论 #42872441 未加载
评论 #42872359 未加载
评论 #42872484 未加载
评论 #42873915 未加载
评论 #42872957 未加载
评论 #42872604 未加载
评论 #42872385 未加载
dotcoma3 个月前
It’s a feature, not a bug !
bryan_w3 个月前
This is totally expected when you use AI to build your infrastructure.
评论 #42873413 未加载
mrbungie3 个月前
[edit: Nevermind, see below]<p>The direct disclosure of urls and ports is insane. Wonder if they would be as irresponsible if it was MSFT, OpenAI, Anthropic, etc.<p>PS: Not defending DeepSeek for bad practices, but still. Nothing irresponsible here.<p>PS2: It is marked as resolved, I went directly to the vulns due to the title of the post.
评论 #42872495 未加载
评论 #42872497 未加载
评论 #42872500 未加载
tomlockwood3 个月前
This doesn&#x27;t look like a responsible disclosure, at all.<p>ed: I was wrong!
评论 #42872623 未加载
评论 #42872428 未加载
samedev3 个月前
Man! I used deepseek.com luckily I didn&#x27;t use the same password as I use. :) Time to use ollama!