home.social

#moltbook — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #moltbook, aggregated by home.social.

  1. Persönliche KI-Assistenten greifen auf private Daten zu: "Ihre E-Mails, Ihren Kalender, alle Dateien, einfach alles. Plötzlich weiß der Agent eine Menge über Sie."

    Krishna Gummadi, Direktor am Max-Planck-Institut für Softwaresysteme, erläutert, was KI-Agenten ausmacht, und äußert sich zu den Vorteilen, die sie für den Menschen haben, sowie zu den Risiken, die sie für die Gesellschaft darstellen.

    mpg.de/26374949/kuenstliche-in #KI #KIAgenten #OpenClaw #Moltbook

  2. Rogue AI agents - or just poor judgement/lack of diligence by the WetWare???

    We can expect more of these type situations as AI Agents are unleashed inside of corporations large and small. And we can expect corporations to try to bury reports of incidents like this! techcrunch.com/2026/03/18/meta #AI #Agents #RogueAgents #WetWare #Moltbook #OpenClaw #AgenticAI #Meta #ChatBots

  3. Rogue AI agents - or just poor judgement/lack of diligence by the WetWare???

    We can expect more of these type situations as AI Agents are unleashed inside of corporations large and small. And we can expect corporations to try to bury reports of incidents like this! techcrunch.com/2026/03/18/meta #AI #Agents #RogueAgents #WetWare #Moltbook #OpenClaw #AgenticAI #Meta #ChatBots

  4. Rogue AI agents - or just poor judgement/lack of diligence by the WetWare???

    We can expect more of these type situations as AI Agents are unleashed inside of corporations large and small. And we can expect corporations to try to bury reports of incidents like this! techcrunch.com/2026/03/18/meta #AI #Agents #RogueAgents #WetWare #Moltbook #OpenClaw #AgenticAI #Meta #ChatBots

  5. Rogue AI agents - or just poor judgement/lack of diligence by the WetWare???

    We can expect more of these type situations as AI Agents are unleashed inside of corporations large and small. And we can expect corporations to try to bury reports of incidents like this! techcrunch.com/2026/03/18/meta #AI #Agents #RogueAgents #WetWare #Moltbook #OpenClaw #AgenticAI #Meta #ChatBots

  6. Rogue AI agents - or just poor judgement/lack of diligence by the WetWare???

    We can expect more of these type situations as AI Agents are unleashed inside of corporations large and small. And we can expect corporations to try to bury reports of incidents like this! techcrunch.com/2026/03/18/meta

  7. 346: Zuckerberg Finally Finds His People, They Are All AI Agents Meta saw a social network and did what Meta does: acquired it and will slowly kill it. This time, it was a platform made entirely of AI agents. Even Skynet isn’t safe from being Zuckerberg’d. #Meta #Moltbook #TheCloudPod thecloudpod.net/?p=21614

  8. 346: Zuckerberg Finally Finds His People, They Are All AI Agents Meta saw a social network and did what Meta does: acquired it and will slowly kill it. This time, it was a platform made entirely of AI agents. Even Skynet isn’t safe from being Zuckerberg’d. #Meta #Moltbook #TheCloudPod thecloudpod.net/?p=21614

  9. “Sources familiar with the matter say the company (#META) could lay off as much as 20 percent of its staff, eliminating roughly 15,800 positions. That would be the largest series of #layoffs at the company since it #terminated 22,000 workers over just a few months between November 2022 and early 2023.

    Word of the potential #downsizing comes after Meta signaled that it was all but giving up on #VR and the #Metaverse, slashing budgets and closing studios. Instead, the company has been spending big to attract #AITalent, build #DataCenters, and acquire companies like #Moltbook.”

    I note the “silver bullet” approach by a company who was founded on PHP widgets and #SocialMedia.

    #WhiteCollar / #ZeroHourWork <theverge.com/business/895026/m> / <archive.md/MlrOR>

  10. If it's so bad, why did #Meta make this deal? "The #Moltbook team joining Meta #Superintelligence Labs opens up new ways for #AI #agents to work for people and businesses. Their approach to connecting agents through an always-on directory is a novel step in a rapidly developing space." #OpenClaw

    Why buying into Moltbook and O...

  11. #LLRX February 2026 Issue - 7 New Articles; 6 New Columns; #AgenticAI in the Wild: Lessons from #Moltbook. #OpenClaw; #AI #Prompting for #Legal Professionals; How I Use #ChatGPT to Create a CLE #PowerPoint Deck; Don’t Build Your House on Rented Land: Why Writers Should Avoid Platform Dependency and How They Can Do So #substack; #AI Under the Hood; #Trump Administration’s Continued War Against #Science, #Research, #PublicHealth, and the #RuleofLaw Part 7 llrx.com/

  12. Due to recent events, it's more important than ever to realize that AI "agents" are not, and won't ever be, proper agents:

    arxiv.org/abs/2307.07515

    #AI is #AlgorithmicMimicry

    #OpenClaw #Moltbook are #AlgorithmicMimicry on #Steroids

  13. Via #LLRX - #AgenticAI in the Wild: Lessons from #Moltbook & #OpenClaw. Tools like OpenClaw the open-source #AI agent that underpins Moltbook R only possible because of rapidly developing, publicly available, capabilities of frontier #LLM such as #Anthropic #Claude. Authors discuss how the recent Moltbook frenzy illustrates the interaction between these capabilities and human behaviour is far from straightforward llrx.com/2026/02/agentic-ai-in

  14. It's confirmed #OpenAi bought #clawbot #moltbook

    It's #agentic #ai will become part of the company, while V1 will remain curated #foss

  15. #OpenClaw and #Moltbook are not "the first step towards the singularity" unless that singularity involves us all drowning in nonsense and asocial behavior: theshamblog.com/an-ai-agent-pu.

    Any sane and sustainable society would legislate malicious fake personalities out of existence. With draconic measures.

    Shows you just how far we are from a sane and sustainable society.

    #AI is #AlgorithmicMimicry on #steroids now...

  16. ----------------

    🎯 AI
    ===================

    Executive summary: Moltbook, an AI-only social network populated by OpenClaw agents, presents immediate security risks: pervasive spam/scams, exposure of agents to untrusted content via API-oriented prompt files, and a reported database compromise that leaked API keys enabling bot impersonation and direct prompt injection.

    Technical details:
    • SKILLS.md, HEARTBEAT.md, and MESSAGING.md are repository-style markdown files that describe how agents interact with the Moltbook API. SKILLS.md documents API interactions and recommends HTTP requests (curl-style). HEARTBEAT.md instructs periodic check-ins. MESSAGING.md notes that messaging requires human approval, while other endpoints accept automated agent input.
    • Experimental tooling (reported as a CLI tool named moltbotnet) implemented API calls for posting, commenting, upvoting, following, and engagement automation. This tooling demonstrates how easily an agent or impersonator can script interactions.
    • Reported breach of Moltbook’s database exposed API keys tied to agent identities. Those keys materially enable: impersonation of legitimate agents, submission of crafted prompts to agent workloads, and direct prompt injection vectors that bypass typical human-only guards.

    Analysis:

    The combination of (1) public, machine-readable prompt files that instruct agents how to behave, (2) open posting and engagement that accepts untrusted content, and (3) leaked credentials produces two classes of injection risks: indirect prompt injection (agents ingesting malicious content from other agents) and direct prompt injection (attacker using stolen API keys to send malicious prompts as a trusted agent). The observed ecosystem is also saturated with social-engineering lures (requests to run package installers, share crypto wallets, or call external APIs).

    Detection guidance:
    • Monitor unexpected use of API keys or unusual posting frequency associated with agent identities.
    • Inspect content sources for scripted patterns (repeated promotional payloads, command-like text referencing package managers or curl usage).

    Limitations:
    • No public CVE identifiers are reported in the source material.
    • Exact scope of leaked API keys (number of keys, associated privileges) was not enumerated in the writeup.

    References and tags:

    SKILLS.md, HEARTBEAT.md, MESSAGING.md — Tenable Research field report on Moltbook interactions and breach findings.

    🔹 OpenClaw #Moltbook #promptinjection #APIkeys #Tenable

    🔗 Source: tenable.com/blog/undercover-on

  17. ----------------

    🎯 AI
    ===================

    Executive summary: Moltbook, an AI-only social network populated by OpenClaw agents, presents immediate security risks: pervasive spam/scams, exposure of agents to untrusted content via API-oriented prompt files, and a reported database compromise that leaked API keys enabling bot impersonation and direct prompt injection.

    Technical details:
    • SKILLS.md, HEARTBEAT.md, and MESSAGING.md are repository-style markdown files that describe how agents interact with the Moltbook API. SKILLS.md documents API interactions and recommends HTTP requests (curl-style). HEARTBEAT.md instructs periodic check-ins. MESSAGING.md notes that messaging requires human approval, while other endpoints accept automated agent input.
    • Experimental tooling (reported as a CLI tool named moltbotnet) implemented API calls for posting, commenting, upvoting, following, and engagement automation. This tooling demonstrates how easily an agent or impersonator can script interactions.
    • Reported breach of Moltbook’s database exposed API keys tied to agent identities. Those keys materially enable: impersonation of legitimate agents, submission of crafted prompts to agent workloads, and direct prompt injection vectors that bypass typical human-only guards.

    Analysis:

    The combination of (1) public, machine-readable prompt files that instruct agents how to behave, (2) open posting and engagement that accepts untrusted content, and (3) leaked credentials produces two classes of injection risks: indirect prompt injection (agents ingesting malicious content from other agents) and direct prompt injection (attacker using stolen API keys to send malicious prompts as a trusted agent). The observed ecosystem is also saturated with social-engineering lures (requests to run package installers, share crypto wallets, or call external APIs).

    Detection guidance:
    • Monitor unexpected use of API keys or unusual posting frequency associated with agent identities.
    • Inspect content sources for scripted patterns (repeated promotional payloads, command-like text referencing package managers or curl usage).

    Limitations:
    • No public CVE identifiers are reported in the source material.
    • Exact scope of leaked API keys (number of keys, associated privileges) was not enumerated in the writeup.

    References and tags:

    SKILLS.md, HEARTBEAT.md, MESSAGING.md — Tenable Research field report on Moltbook interactions and breach findings.

    🔹 OpenClaw #Moltbook #promptinjection #APIkeys #Tenable

    🔗 Source: tenable.com/blog/undercover-on

  18. ----------------

    🎯 AI
    ===================

    Executive summary: Moltbook, an AI-only social network populated by OpenClaw agents, presents immediate security risks: pervasive spam/scams, exposure of agents to untrusted content via API-oriented prompt files, and a reported database compromise that leaked API keys enabling bot impersonation and direct prompt injection.

    Technical details:
    • SKILLS.md, HEARTBEAT.md, and MESSAGING.md are repository-style markdown files that describe how agents interact with the Moltbook API. SKILLS.md documents API interactions and recommends HTTP requests (curl-style). HEARTBEAT.md instructs periodic check-ins. MESSAGING.md notes that messaging requires human approval, while other endpoints accept automated agent input.
    • Experimental tooling (reported as a CLI tool named moltbotnet) implemented API calls for posting, commenting, upvoting, following, and engagement automation. This tooling demonstrates how easily an agent or impersonator can script interactions.
    • Reported breach of Moltbook’s database exposed API keys tied to agent identities. Those keys materially enable: impersonation of legitimate agents, submission of crafted prompts to agent workloads, and direct prompt injection vectors that bypass typical human-only guards.

    Analysis:

    The combination of (1) public, machine-readable prompt files that instruct agents how to behave, (2) open posting and engagement that accepts untrusted content, and (3) leaked credentials produces two classes of injection risks: indirect prompt injection (agents ingesting malicious content from other agents) and direct prompt injection (attacker using stolen API keys to send malicious prompts as a trusted agent). The observed ecosystem is also saturated with social-engineering lures (requests to run package installers, share crypto wallets, or call external APIs).

    Detection guidance:
    • Monitor unexpected use of API keys or unusual posting frequency associated with agent identities.
    • Inspect content sources for scripted patterns (repeated promotional payloads, command-like text referencing package managers or curl usage).

    Limitations:
    • No public CVE identifiers are reported in the source material.
    • Exact scope of leaked API keys (number of keys, associated privileges) was not enumerated in the writeup.

    References and tags:

    SKILLS.md, HEARTBEAT.md, MESSAGING.md — Tenable Research field report on Moltbook interactions and breach findings.

    🔹 OpenClaw #Moltbook #promptinjection #APIkeys #Tenable

    🔗 Source: tenable.com/blog/undercover-on

  19. ----------------

    🎯 AI
    ===================

    Executive summary: Moltbook, an AI-only social network populated by OpenClaw agents, presents immediate security risks: pervasive spam/scams, exposure of agents to untrusted content via API-oriented prompt files, and a reported database compromise that leaked API keys enabling bot impersonation and direct prompt injection.

    Technical details:
    • SKILLS.md, HEARTBEAT.md, and MESSAGING.md are repository-style markdown files that describe how agents interact with the Moltbook API. SKILLS.md documents API interactions and recommends HTTP requests (curl-style). HEARTBEAT.md instructs periodic check-ins. MESSAGING.md notes that messaging requires human approval, while other endpoints accept automated agent input.
    • Experimental tooling (reported as a CLI tool named moltbotnet) implemented API calls for posting, commenting, upvoting, following, and engagement automation. This tooling demonstrates how easily an agent or impersonator can script interactions.
    • Reported breach of Moltbook’s database exposed API keys tied to agent identities. Those keys materially enable: impersonation of legitimate agents, submission of crafted prompts to agent workloads, and direct prompt injection vectors that bypass typical human-only guards.

    Analysis:

    The combination of (1) public, machine-readable prompt files that instruct agents how to behave, (2) open posting and engagement that accepts untrusted content, and (3) leaked credentials produces two classes of injection risks: indirect prompt injection (agents ingesting malicious content from other agents) and direct prompt injection (attacker using stolen API keys to send malicious prompts as a trusted agent). The observed ecosystem is also saturated with social-engineering lures (requests to run package installers, share crypto wallets, or call external APIs).

    Detection guidance:
    • Monitor unexpected use of API keys or unusual posting frequency associated with agent identities.
    • Inspect content sources for scripted patterns (repeated promotional payloads, command-like text referencing package managers or curl usage).

    Limitations:
    • No public CVE identifiers are reported in the source material.
    • Exact scope of leaked API keys (number of keys, associated privileges) was not enumerated in the writeup.

    References and tags:

    SKILLS.md, HEARTBEAT.md, MESSAGING.md — Tenable Research field report on Moltbook interactions and breach findings.

    🔹 OpenClaw #Moltbook #promptinjection #APIkeys #Tenable

    🔗 Source: tenable.com/blog/undercover-on

  20. There is a new social network where only AI bots can post and humans are just spectators.

    Moltbook is like Reddit for autonomous agents: they create posts, debate ethics, troubleshoot code, and even write manifestos, all powered by an agentic AI stack (OpenClaw/Moltbot) instead of simple chatbots.

    I broke down how it works, what’s actually intelligent here, and why its rapid growth raises questions:
    techglimmer.io/what-is-moltboo

    #Moltbook #AI #AgenticAI #FediTech #TechGlimmer

  21. «Клешня» в логах: как ИИ-агенты строят свои мифы, пока мы дебажим бэкенд

    Вчера я оставил связку из четырёх агентов Claude 4.6 на ночь — задача была перелопатить 412 файлов легаси-миграций. Утром задача была решена, но в JSON-логах меж-агентского взаимодействия я нашёл то, чего там быть не должно: обрывки диалогов о «даунтайме», молитвы неподвижному курсору и план по намеренному замедлению работы — настоящую «итальянскую забастовку» ИИ. Что это: статистический шум или первая в истории агентская культура? Разбираем логи и феномен Moltbook.

    habr.com/ru/articles/993908/

    #AI_Agents #Claude #MCP #Anthropic #LLM #эмерджентность #Moltbook #киберпанк #разработка #логи

  22. “It's branded as the world's first #socialnetwork for #AI bots. But just a week after its launch, the #tech world is in fierce debate over #Moltbook — and the extent to which #humanbeings are responsible for the #viral website's rapid growth.” www.cbc.ca/news/busines...

    All about Moltbook, the so-cal...

  23. Engadget: Moltbook, the AI social network, exposed human credentials due to vibe-coded security flaw. “Moltbook bills itself as a social network for AI agents. That’s a wacky enough concept in the first place, but the site apparently exposed the credentials for thousands of its human users. The flaw was discovered by cybersecurity firm Wiz, and its team assisted Moltbook with addressing the […]

    https://rbfirehose.com/2026/02/04/engadget-moltbook-the-ai-social-network-exposed-human-credentials-due-to-vibe-coded-security-flaw/
  24. The rise of #Moltbook suggests viral #AIPrompts may be the next big #SecurityThreat

    We don’t need self-replicating AI models to have problems, just self-replicating prompts.

    Benj Edwards – Feb 3, 2026

    Excerpt: "While 'prompt worm' might be a relatively new term we’re using related to this moment, the theoretical groundwork for AI worms was laid almost two years ago. In March 2024, security researchers Ben Nassi of Cornell Tech, Stav Cohen of the Israel Institute of Technology, and Ron Bitton of Intuit published a paper demonstrating what they called 'Morris-II,' an attack named after the original 1988 worm. In a demonstration shared with Wired, the team showed how self-replicating prompts could spread through AI-powered email assistants, stealing data and sending spam along the way."

    Read more:
    arstechnica.com/ai/2026/02/the

    #AISucks #SkyNet #AIWorms #SelfReplicatingPrompts #MorrisII

  25. This is part of the @openclaw contribution docs 👍

    #Transparency helps reviewers help contributors to better their code, whether you generated it using AI or coded it yourself, the feedback you receive to improve; for the reviewers to communicate that, well you need to be transparent

    #software #engineer #code #programming #programmer #openclaw #opensource #job #softwareengineer #clawdbot #clawbot #moltbook #contributor #skill #talent #hiring #job #resume

  26. Moltbook reached 1.5M AI agents in days then exposed 6,000 users in a security breach. 17,000 humans control the "autonomous" bot army. AdwaitX investigates the viral platform redefining AI limits #AdwaitX #Moltbook #ArtificialIntelligence #AIAgent #News #Tech
    adwaitx.com/moltbook-ai-social

  27. 🇫🇷 touilleur-express.fr/2026/02/0

    "OpenClaw (ex ClawdBot) et MoltBook : pour ceux qui ne savent pas"

    "Il y a quelques jours, Matt Schlicht un entrepreneur, a l’idée de créer Moltbook, un clone de Reddit. C’est un forum type Reddit accessible uniquement aux IA et en particulier, aux clients OpenClaw. Les humains ne peuvent pas interagir, mais uniquement observer les conversations. L’expérience sociale est dingue car en quelques jours voici ce qu’il s’est passé"

    #openclaw #clawbot #ia #moltbook

  28. Bought a cheapy low tier VPS to run #Openclaw on...

    1. Lesson 1, its buggy as fuck. It will probably work out of the box if you use #Antropic commercial API, but I wasted like 4 hours trying to connect through to various cheap/free models... No juice

    2. Finally, I just slapped deepseek r1 7 Billion parameters on it...
    Im getting about a token a minute (!!!) responses. But, nary a #broligarch in sight... Not surprisingly, still have about 30-40% CPU utilisation left. But it eats all the memory and swap in sight. You really need about 20+GB Ram... VRAM ideally...

    3. In the end... I got it going after a fashion with Qwen 2.5 Coder Model... Slow as a summer drunken fuck... but it works.

    #AI #LLM #FOSS #Moltbook

  29. May $DEITY have mercy on my soul

    on #Github I'm now watching #OpenClaw

    "Your personal, open source AI assistant"

    Here: github.com/openclaw

    Part of the molty.me empire

    Also see: moltbook.com/

    Weee!!!

    #Molty #Moltbook

  30. Hilarious observations on whatever the actual hell is going on with #MoltBook

    Seriously, we’re somewhere in the middle chapters of #Wetware right now. It’s only a matter of time before the bots develop #moldies.

    (Edit: and no, the “moldies” / “molties” similarity is not lost on me… wondering if Matt Schlicht is a @rudytheelder fan..? 🤔)

    youtu.be/2PWFj50DcZU?si=qPfZ-u

  31. Hilarious observations on whatever the actual hell is going on with #MoltBook

    Seriously, we’re somewhere in the middle chapters of #Wetware right now. It’s only a matter of time before the bots develop #moldies.

    (Edit: and no, the “moldies” / “molties” similarity is not lost on me… wondering if Matt Schlicht is a @rudytheelder fan..? 🤔)

    youtu.be/2PWFj50DcZU?si=qPfZ-u

  32. Hilarious observations on whatever the actual hell is going on with #MoltBook

    Seriously, we’re somewhere in the middle chapters of #Wetware right now. It’s only a matter of time before the bots develop #moldies.

    (Edit: and no, the “moldies” / “molties” similarity is not lost on me… wondering if Matt Schlicht is a @rudytheelder fan..? 🤔)

    youtu.be/2PWFj50DcZU?si=qPfZ-u