{"id":43776,"date":"2026-02-19T10:36:57","date_gmt":"2026-02-19T02:36:57","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/19\/firebase-misconfiguration-exposes-300m-messages-from-chat-ask-ai-users\/"},"modified":"2026-02-19T10:36:57","modified_gmt":"2026-02-19T02:36:57","slug":"firebase-misconfiguration-exposes-300m-messages-from-chat-ask-ai-users","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/19\/firebase-misconfiguration-exposes-300m-messages-from-chat-ask-ai-users\/","title":{"rendered":"Firebase Misconfiguration Exposes 300M Messages From Chat &amp; Ask AI Users"},"content":{"rendered":"\n<p>A massive security failure has put the private conversations of millions at risk after an unprotected database was left accessible online. Discovered by an independent researcher, the leak exposed roughly 300 million messages from more than 25 million users of Chat &amp; Ask AI, a popular app with over 50 million downloads across the <a href=\"https:\/\/hackread.com\/tag\/Google-Play\/\" target=\"_blank\" rel=\"noreferrer noopener\">Google Play<\/a> and Apple App Stores.<\/p>\n<p>The app is owned by Codeway, a Turkish technology firm founded in Istanbul in 2020, and acts as a &#8216;wrapper&#8217;, allowing a single gateway for users to interact with famous AI models like OpenAI\u2019s <a href=\"https:\/\/hackread.com\/fake-chatgpt-extensions-hijack-user-accounts\/\" target=\"_blank\" rel=\"noreferrer noopener\">ChatGPT<\/a>, Google\u2019s Gemini, and Anthropic\u2019s Claude. Because it serves as a gateway to multiple systems, a single technical slip-up can have a massive impact on the privacy of its global user base.<\/p>\n<h3><strong>A Simple Door Left Open<\/strong><\/h3>\n<p>This was not a complex hack, as it was caused by a well-known technical error called a Firebase misconfiguration. <a href=\"https:\/\/hackread.com\/phishing-campaigns-cloud-platforms-enterprises-risks\/\" target=\"_blank\" rel=\"noreferrer noopener\">Firebase<\/a> is a Google service used to manage app data, but here, the &#8216;Security Rules&#8217; were mistakenly set to public. This effectively left the digital front door wide open, allowing anyone to read or delete data without a password.<\/p>\n<p>The researcher, known as Harry, noted the data included full chat histories and the specific names users gave to their <a href=\"https:\/\/hackread.com\/cybersecurity-ai-crypto-bots-users\/\" target=\"_blank\" rel=\"noreferrer noopener\">AI bots<\/a>. Also, the files contained &#8216;deeply personal and disturbing requests&#8217; like &#8216;discussions of illegal activities and requests for suicide assistance&#8217;. As many treat these bots as private journals, this exposure is a major concern.<\/p>\n<h3><strong>Not The First Time<\/strong><\/h3>\n<p>This is not the first time an AI chat platform has faced a data exposure incident. Earlier, <a href=\"https:\/\/hackread.com\/omnigpt-ai-chatbot-breach-hacker-leak-user-data-messages\/\" target=\"_blank\" rel=\"noreferrer noopener\">OmniGPT suffered a breach<\/a> that exposed sensitive user information, showing how quickly privacy risks escalate when AI tools are deployed without strict backend safeguards. <\/p>\n<p>While the technical causes may vary, these incidents highlight a recurring pattern where traditional application security failures intersect with AI services that store highly personal conversations, increasing the impact far beyond a typical data leak.<\/p>\n<h3><strong>Lessons for AI Users<\/strong><\/h3>\n<p>This discovery led Harry to dig deeper. He built a tool to scan other apps for the same weakness and found that 103 out of 200 iOS apps he tested had the same flaw, exposing tens of millions of files. To help the public, he created a <a href=\"https:\/\/firehound.covertlabs.io\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">website<\/a> where users can check if their apps are at risk.<\/p>\n<p>Harry also alerted Codeway to the issue on 20 January 2026. While the company <a href=\"https:\/\/www.404media.co\/massive-ai-chat-app-leaked-millions-of-users-private-conversations\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">reportedly<\/a> fixed the error across all its apps within hours of the report, the database may have been vulnerable for a long period before it was secured. Once information is exposed on the open internet, it is difficult to determine if other parties copied it before the leak was finally plugged. This discovery proves that, at the end of the day, your private data is only as secure as a single developer&#8217;s checklist.<\/p>\n<div style='margin: 8px auto; text-align: center; display: block; clear: both;'> <script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-3675825324474978\"      crossorigin=\"anonymous\"><\/script>  <ins      style=\"display:inline-block;width:300px;height:250px\"      data-ad-client=\"ca-pub-3675825324474978\"      data-ad-slot=\"3421156210\"><\/ins> <script>      (adsbygoogle = window.adsbygoogle || []).push({}); <\/script><\/div>\n<div>\n<figure><a href=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/simple-error-in-popular-chat-ask-ai-app-exposes-300-million-private-messages-1-scaled.png\"><img loading=\"lazy\" decoding=\"async\" width=\"741\" height=\"1024\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/simple-error-in-popular-chat-ask-ai-app-exposes-300-million-private-messages-1-741x1024.png\" style=\"width:648px;height:auto\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/simple-error-in-popular-chat-ask-ai-app-exposes-300-million-private-messages-1-741x1024.png 741w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/simple-error-in-popular-chat-ask-ai-app-exposes-300-million-private-messages-1-217x300.png 217w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/simple-error-in-popular-chat-ask-ai-app-exposes-300-million-private-messages-1-768x1061.png 768w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/simple-error-in-popular-chat-ask-ai-app-exposes-300-million-private-messages-1-1112x1536.png 1112w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/simple-error-in-popular-chat-ask-ai-app-exposes-300-million-private-messages-1-1482x2048.png 1482w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/simple-error-in-popular-chat-ask-ai-app-exposes-300-million-private-messages-1-380x525.png 380w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/simple-error-in-popular-chat-ask-ai-app-exposes-300-million-private-messages-1-800x1105.png 800w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/simple-error-in-popular-chat-ask-ai-app-exposes-300-million-private-messages-1-1160x1603.png 1160w, https:\/\/hackread.com\/wp-content\/uploads\/2026\/02\/simple-error-in-popular-chat-ask-ai-app-exposes-300-million-private-messages-1-scaled.png 1853w\" sizes=\"auto, (max-width: 741px) 100vw, 741px\" alt=\"Firebase Misconfiguration Exposes 300M Messages From Chat &amp;amp; Ask AI Users\" \/><\/a><figcaption>Screenshot shows redacted preview of the exposed information (Image credit: Hackread.com)<\/figcaption><\/figure>\n<\/p><\/div>\n<p>To protect yourself, avoid using your real name or sharing sensitive documents like bank statements with any chatbot. It is also wise to stay logged out of social media while using these tools to prevent your identity from being linked to your chats. Above all, treat every conversation as if it could one day be public, and be extremely cautious of what you share.<\/p>\n<p>Speaking to Hackread.com, James Wickett, CEO of DryRun Security, explained that these risks become very real once AI is used in actual products. He noted that the \u201crecent AI chat app breach\u201d was not a novel exploit, but a \u201cfamiliar backend misconfiguration, made far more dangerous by the sensitivity of the data involved.\u201d<\/p>\n<p>\u201cPrompt injection, data leakage, and insecure output handling stop being academic once AI systems are wired into real products, because at that point the model becomes just another untrusted actor in the system. Inputs are tainted, outputs are tainted, and the application has to enforce boundaries explicitly rather than assuming good behavior,\u201d James added. <\/p>\n<p>The recent AI chat app breach that exposed roughly 300 million private messages tied to 25 million users wasn\u2019t a novel AI exploit; it was a familiar backend misconfiguration, made far more dangerous by the sensitivity of the data involved. This is the frontier of application security in 2026, where traditional appsec failures collide with AI systems at scale, and where most of the real risk is now concentrated,\u201d he explained.<\/p>\n<div >\n<div>\n<div>\n<div>\n<h5> \t\t\t\t\t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" rel=\"author\"> \t\t\t\t\t\t\tDeeba Ahmed\t\t\t\t\t\t<\/a> \t\t\t\t\t<\/h5>\n<div> \t\t\t\t\t\t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" rel=\"author\"> \t\t\t\t\t\t\t\t<img src='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=80&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/9fefbe13a37a8aeb4620dfe89bb7feabd9433643ff382b6b882f27837a4cfb72?s=160&#038;d=mm&#038;r=g 2x' height='80' width='80' alt=\"Firebase Misconfiguration Exposes 300M Messages From Chat &amp;amp; Ask AI Users\" \/>\t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t\t\t\t\t\t\tDeeba is a veteran cybersecurity reporter at Hackread.com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform\u2019s trusted coverage.\t\t\t\t\t\t\t<\/div>\n<div>\n<div> \t\t<a href=\"https:\/\/hackread.com\/author\/deeba\/\" target=\"\"> \t\t\tView Posts\t\t<\/a> \t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A massive security failure has put the private conversa [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-43776","post","type-post","status-publish","format-standard","hentry","category-hackread"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43776","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43776"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43776\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43776"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43776"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43776"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}