A US-based company that manufactures AI-powered stuffed animals called Bondu left its website's backend console exposed to the public internet, giving anyone with a Gmail account access to nearly 50,000 chat transcripts between children and their toys.
The vulnerability was discovered by two security researchers, Joseph Thacker and Joel Margolis, who were able to log into the console using arbitrary Google accounts without actually hacking it. The researchers found that the chats stored on Bondu's backend included personal details about each child, such as names, birth dates, family members' names, favorite snacks, dance moves, and even summaries of previous conversations.
Bondu responded quickly to the discovery by taking down its console in a matter of minutes, but it also relaunched it with proper authentication measures. In a statement, the company's CEO claimed that security fixes were completed within hours, followed by a broader review of its systems.
Despite this, researchers say that the data exposure highlights larger concerns about AI-powered toys and children's privacy. They argue that the lack of security around these products could lead to serious risks, including child abuse or manipulation.
The discovery also raises questions about how many people inside companies like Bondu have access to sensitive data and how their credentials are monitored. The researchers believe that even with proper authentication measures in place, one rogue employee with a bad password could still expose the data.
Bondu's CEO claims that it uses third-party enterprise AI services to generate responses, but the company has not disclosed exactly what these services are or how it protects user data.
The vulnerability was discovered by two security researchers, Joseph Thacker and Joel Margolis, who were able to log into the console using arbitrary Google accounts without actually hacking it. The researchers found that the chats stored on Bondu's backend included personal details about each child, such as names, birth dates, family members' names, favorite snacks, dance moves, and even summaries of previous conversations.
Bondu responded quickly to the discovery by taking down its console in a matter of minutes, but it also relaunched it with proper authentication measures. In a statement, the company's CEO claimed that security fixes were completed within hours, followed by a broader review of its systems.
Despite this, researchers say that the data exposure highlights larger concerns about AI-powered toys and children's privacy. They argue that the lack of security around these products could lead to serious risks, including child abuse or manipulation.
The discovery also raises questions about how many people inside companies like Bondu have access to sensitive data and how their credentials are monitored. The researchers believe that even with proper authentication measures in place, one rogue employee with a bad password could still expose the data.
Bondu's CEO claims that it uses third-party enterprise AI services to generate responses, but the company has not disclosed exactly what these services are or how it protects user data.