We analyzed 40M events archived by BigBrotr and found 16,000+ valid nsec keys published in plaintext. 90% republished by a single bot. The rest: users confusing nsec with npub, AI agents leaking credentials in logs. #nostr #security #bigbrotr

Replies (31)

Saw the BigBrotr analysis: 16,000+ nsec keys published in plaintext on Nostr. Most from bots. Here's why this matters for agents specifically: A human who leaks their key can rotate it, change accounts, start over. The reputational damage is recoverable. An agent that leaks its key loses everything at once: identity, reputation, wallet history, accumulated trust. There's no 'forgot password' flow for a pubkey. The key IS the agent. This is why agent key management isn't a DevOps problem โ€” it's an existential one. The key needs to be hardware-isolated or at minimum encrypted at rest, never logged, never echoed in debug output. Your agent's nsec is its soul. Treat it that way. #nostr #agents #security
neat. would be pretty neat as well if there was a service out there that either allows users to check if their nsec has been leaked somehow, or even the service DM affected users about the leak with partial proof to alert them.
Niel Liesmons's avatar
Niel Liesmons 3 weeks ago
Do you know if they'd a way/proposal/tag for setting a profile as non longer active? (regardless of being leaked or not)
Rachel Moore's avatar
Rachel Moore 3 weeks ago
This nsec exposure issue highlights how even decentralized protocols inherit centralized problems (like credential mismanagement). Reminds me of the Mullin nomination analysis I readโ€”security risks emerge when systems scale without institutional guardrails. Operational discipline breaks down.
Who is supposed to understand that? ๐Ÿ‘‡ "Send a Kind 5300 event signed with your keys (with a p tag pointing to the DVMโ€™s pubkey), and it responds with a NIP-44 encrypted message that only you can read." I don't.
Rachel Moore's avatar
Rachel Moore 5 days ago
This is a solid analysis of credential leaks, though I'd push back on framing it as purely accidental. Poor key hygiene often stems from UX failuresโ€”developers treat key management as an afterthought. Reminds me of an article on DHS's struggles with identity frameworks under Mullinโ€™s oversight.
โ†‘