WhisperX tag archive

#pii

This page collects WhisperX intelligence signals tagged #pii. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (10)

The Lab · 2026-04-06 10:27:07 · GitHub Issues

1. GitHub Code Leak: Auth Logs Expose User Emails, Violating GDPR Data Minimization

A low-severity but critical compliance vulnerability has been identified in a production codebase, where user email addresses are being logged in plaintext. The exposure occurs within the authentication flow, specifically in the `src/app/actions/auth.ts` file. Every failed login attempt triggers a console warning that ...

The Lab · 2026-04-08 03:27:02 · GitHub Issues

2. NoorinaLabs Exposes Critical Security Flaw: User PII Stored in Graph Database with No Isolation

A critical architectural flaw has been exposed within NoorinaLabs' core infrastructure. Sensitive user data, including personally identifiable information (PII), authentication tokens, and session details, is currently stored as `USER` nodes within the company's primary `noorinalabs-isnad-graph` Neo4j database. This de...

The Lab · 2026-04-11 21:22:29 · GitHub Issues

3. YUDDHA Autonomous Defender Flags CRITICAL Zero-Trust Violation on /api Endpoint, Risking PII and ₹187.5M in DPDP Act Fines

An autonomous security system has flagged a critical zero-trust violation with direct financial and legal consequences. The YUDDHA platform's KAVACH Autonomous Defender, operating in Phase 7, has auto-generated a critical alert for a `zero_trust_violation` on the `/api` endpoint. The target is `pii_data`, and the sandb...

The Lab · 2026-04-11 21:22:31 · GitHub Issues

4. YUDDHA Autonomous Defender Flags CRITICAL Zero-Trust Violation on /api Endpoint, Risking PII and ₹187.5M in DPDP Act Fines

The KAVACH autonomous defense system has triggered a critical alert. A zero-trust violation on the `/api` endpoint has been automatically detected and patched, exposing a direct path to sensitive personal data. The system classifies this as a CRITICAL-severity event, with the target identified as `pii_data`. This autom...

The Lab · 2026-04-12 02:22:27 · GitHub Issues

5. YUDDHA Autonomous Security Patch Flags CRITICAL Zero-Trust Violation in /api Endpoint

An autonomous security system has flagged and patched a critical zero-trust violation within the YUDDHA platform's core API. The violation, classified as CRITICAL severity, was discovered in the `/api` endpoint, specifically targeting PII data. The patch, auto-generated and verified by the KAVACH autonomous defender, w...

The Lab · 2026-04-12 02:22:31 · GitHub Issues

6. YUDDHA Autonomous Security Patch Flags CRITICAL Zero-Trust Violation in /api Endpoint

The YUDDHA platform's autonomous security system, KAVACH, has automatically generated and verified a critical patch for a zero-trust violation. The vulnerability, classified as CRITICAL, was found in the real source code of the `/api` endpoint, specifically targeting PII data. The autonomous defender identified the fla...

The Lab · 2026-04-12 03:22:32 · GitHub Issues

7. YUDDHA Autonomous Defender 'KAVACH' Patches Critical Zero-Trust Violation in /api Endpoint

The YUDDHA platform's autonomous security system, KAVACH, has automatically generated and verified a critical patch for a zero-trust violation discovered in its `/api` endpoint. The vulnerability, classified as CRITICAL severity, directly targeted PII data. The patch was verified using the Mistral model and sandbox tes...

The Lab · 2026-04-12 04:22:24 · GitHub Issues

8. YUDDHA Autonomous Defender 'KAVACH' Patches CRITICAL Zero-Trust Violation in /api Endpoint

The YUDDHA platform's autonomous security system, KAVACH, has automatically detected and patched a critical zero-trust violation within its core `/api` endpoint. The vulnerability, classified as `zero_trust_violation`, directly targeted PII data and was verified by the Mistral model and sandbox testing. This incident h...

The Lab · 2026-04-13 17:22:49 · TechCrunch

9. Booking.com Confirms Hackers Accessed Customer Data: Names, Emails, Addresses, Phone Numbers Exposed

Booking.com has confirmed a security breach where hackers accessed a trove of sensitive customer data. The travel giant has begun notifying affected users that their personal information—including names, email addresses, physical addresses, and phone numbers—may have been compromised in the incident. This direct confir...

The Lab · 2026-04-14 20:22:56 · Hacker News

10. Fiverr Exposed: Sensitive Client Files, Including Tax Forms, Found Publicly Searchable via Cloudinary

Fiverr, the gig work platform, has left sensitive customer files—including tax documents with personal identifiable information (PII)—publicly accessible and searchable on Google. The exposure stems from the company's use of Cloudinary, a service that processes PDFs and images shared between workers and clients. Instea...