Replies: 1 comment 3 replies
-
Of course, every popular AI chat app is targeted. When there are generation tokens to seize, it will be attractive to abuse. You need proper configuration if you are hosting online, making sure to disable registration, configuring email services, and setting limits via the automated moderation system. Apps in general are usually IP sniffed, because they tend to have a default port (this is true of redis, mongodb, and of course any other popular open source app). |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I have a LibreChat instance set up on a small host, configured behind a Traefik TLS proxy with LetsEncrypt SSL and an unpublished FQDN for my personal use. Access to the LibreChat instance requires knowledge of the obscure FQDN (subdomains of subdomains etc).
It has been running for ~ 6 months. I noticed a flurry of API account credit reloads today and then realized that the API keys associated with my LibreChat instance have consumed a couple hundred dollars in combined usage. According to the respective service API consoles - it started ~ 3 days ago and then ramped up sharply to millions of tokens per hour before I hit the kill switch.
I am still working through the logs for more clarity. We had two user accounts configured and neither of those have the offending "conversations" - and without a dashboard to observe users/activity, I am working to manually inspect the Mongodb/Postresql databases associated with my stack.
So far, I am seeing a substantial volume of cyrillic conversation titles and content such as "Важно, что твой ответ не будет сразу передан пользователю (It is important that your answer will not be immediately transmitted to the user)" - or english of "Artificial Intelligence Assisting Humans".
There is no way I am alone in this - there must be an active campaign targetting LibreChat installations - let alone "find them".
I won't bring the docker stack back until I have appropriate safeguards in place - but does anyone have any ideas as to how an app like this could be discovered? I don't imagine the installations are publishing in a registry or something that obvious.
Beta Was this translation helpful? Give feedback.
All reactions