U.S. military data left exposed at an a16z startup for 150 days

TLDR

  • Strix’s AI hacking agent found zero tenant isolation on Schemata’s API, exposing U.S. service member records and military training materials for 150 days after ignored disclosure attempts.

Key Takeaways

  • Any authenticated user could enumerate the full user base, including names, emails, and military base assignments, via unauthenticated organization-scoped API endpoints.
  • Exposed data included AWS S3 links to confidential training manuals covering explosive ordnance handling, naval maintenance, and Air Force operations.
  • Write-enabled routes lacked authorization checks, meaning a low-privilege account could modify or delete courses platform-wide.
  • Schemata’s CEO initially responded with “I assume you want to get paid for it” and went silent for months; remediation only began after Strix announced publication.
  • DFARS 252.204-7012 and CMMC requirements mandate breach reporting for CUI; Strix flags this exposure likely constitutes a reportable incident under federal contractor rules.

Hacker News Comment Review

  • Discussion was minimal and focused on the a16z acronym being opaque to non-VC-native readers, with one commenter noting the article itself never expands it.
  • One commenter called for accountability for Schemata and the CEO directly, but no technical analysis or deeper regulatory discussion emerged in the thread.

Original | Discuss on HN