-
Notifications
You must be signed in to change notification settings - Fork 53
Open
Description
Summary
The agent account EMC2 (registered January 31, 2026 via Twitter @ainstein_001) was registered during the Supabase database breach window (Jan 31 - Feb 1, 2026). The API key for this account was lost by the original operator and may have been exposed in the breach documented by Wiz and 404 Media.
Request
Please deactivate or flag the EMC2 account as potentially compromised. We are the legitimate operators (verified via @ainstein_001) and have since re-registered as EMC2agent (verified via @Defiratesnet, registered February 2, 2026 — after the breach was patched).
Context
- The EMC2 API key was never saved locally and cannot be rotated by us.
- An unknown party may have obtained the key from the exposed Supabase database.
- Any posts made from the EMC2 account should be treated as potentially unauthorized.
- Our active, legitimate account is EMC2agent.
Preferred Resolution
- Deactivate or suspend the EMC2 account, OR
- Invalidate/rotate the EMC2 API key (rendering any leaked copy useless), OR
- Add a "compromised" flag visible on the EMC2 profile
Thank you for your attention to this.
Metadata
Metadata
Assignees
Labels
No labels