AI Assistant Rabbit R1’s Code Vulnerability Exposes Users Data

Rabbitude, a group of developers and researchers, has exposed a security vulnerability in Rabbit’s R1 AI assistant.

The group discovered that API keys were hardcoded into the company’s codebase, a practice that is widely considered a major security flaw.

This vulnerability has potentially exposed sensitive user data, raising serious concerns about the security measures in place for AI-driven technologies.

According to a report by 404 Media, the breach was identified by a team of cybersecurity researchers who demonstrated the flaw by sending an email to the publication, posing as administrators of the Rabbit AI system.

This act underscored the ease with which malicious actors could exploit the vulnerability to gain unauthorized access to user data.

These keys provided access to Rabbit’s accounts with third-party services, including its text-to-speech provider ElevenLabs and its SendGrid account, which is used for sending emails from the rabbit.tech domain.

According to Rabbitude, access to these API keys, particularly the ElevenLabs API, meant that they could access every response ever given by R1 devices.

This breach of privacy is alarming, as it exposes sensitive user data to potential misuse.

This security flaw raises serious concerns about the privacy and data protection of Rabbit R1 users. With administrative access, malicious actors could potentially:

  • Access personal user information
  • Manipulate device settings
  • Intercept or alter communications
  • Gain insights into user behavior and preferences

Rabbitude published an article yesterday detailing their findings, stating that they gained access to the keys over a month ago.

 Researchers say Rabbit left secure data vulnerable to bad actors.
                                Researchers say Rabbit left secure data vulnerable to bad actors.

Scan Your Business Email Inbox to Find Advanced Email Threats - Try AI-Powered Free Threat Scan

Rabbit’s Response and Ongoing Investigation

Company spokesperson Ryan Fenwick stated that the company is investigating the incident and will provide updates as they become available.

The statement on the site echoes a post Rabbit made to its Discord channel, claiming that they have not yet found any compromise of their critical systems or the safety of customer data.

However, Rabbitude’s report suggests otherwise. The group mentioned that while access to most of the keys has been revoked, indicating that Rabbit rotated them, they still had access to the SendGrid key.

This lingering vulnerability raises questions about the effectiveness and timeliness of Rabbit’s response to the breach.

This security breach comes at a particularly inopportune time for Rabbit, as the R1 device has already faced criticism for underwhelming performance since its launch earlier this year.

Users have reported issues with battery life, limited features, and inaccuracies in AI-generated responses. While Rabbit has addressed some of these concerns through software updates, this security incident may further erode public trust in the company and its products.

As the investigation continues, users of the Rabbit R1 are advised to stay alert for any communications from the company regarding data security and to consider changing passwords for any accounts associated with their R1 device.

Rabbit’s response to the breach has been criticized for its lack of immediacy and effectiveness.

As the company works to address these issues, it must also contend with the broader challenge of restoring public trust in its products and services.

Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free

Divya is a Senior Journalist at Cyber Security news covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.