DeepSeek database exposes API keys and chat history

DeepSeek, the Chinese AI startup known for its DeepSeek-R1 LLM model, has publicly exposed two databases containing sensitive user and operational information.

Wiz Research discovered a publicly accessible ClickHouse database belonging to DeepSeek, containing over 1 million log entries, and exposing chat history, secret keys, and backend details.

“Within minutes, we found a publicly accessible ClickHouse database linked to DeepSeek, completely open and unauthenticated, exposing sensitive data. It was hosted at oauth2callback.deepseek.com:9000 and dev.deepseek.com:9000.” reads the report published by Wiz.

“This database contained a significant volume of chat history, backend data and sensitive information, including log streams, API Secrets, and operational details.” continues the report.

This exposure could have allowed full database control and potential privilege escalation within the DeepSeek environment, without any authentication.

After responsible disclosure, DeepSeek promptly secured the issue.

Read more about it here.

Leave a Reply

Your email address will not be published. Required fields are marked *