Imagine discovering a secret that could jeopardize the security of millions—and getting paid handsomely for it. That’s exactly what happened when a security researcher uncovered a critical data leak in Starlink, SpaceX’s groundbreaking satellite internet service. But here’s where it gets controversial: while the researcher earned a $6,000 bug bounty, the details of the vulnerability remain shrouded in mystery, leaving many to wonder just how exposed Starlink’s 9 million users really were.
Angelo Gueta, a Philippines-based researcher, stumbled upon a software bug that was inadvertently leaking sensitive information from Starlink’s systems. He promptly reported the issue to SpaceX, which rewarded him through its bug bounty program—a platform that encourages ethical hackers to find and disclose security flaws. In a cryptic LinkedIn post, Gueta hinted at the gravity of his discovery: ‘SpaceX can reach orbit. Their secret reached me.’ He added, ‘Some secret accidentally leaked with unpredicted potential, including information that should not be exposed to the public.’
While SpaceX acknowledged the flaw and confirmed it had been patched, the company’s response raised eyebrows. A screenshot shared by Gueta revealed SpaceX’s admission that the leak involved personal identifiable information (PII) and could have led to ‘broader impact beyond,’ including potential reputational damage. And this is the part most people miss: the vague details leave room for speculation about the true extent of the vulnerability.
This isn’t Gueta’s first rodeo with SpaceX. He previously earned a $2,500 reward for discovering an authentication bypass flaw, solidifying his position as the top contributor to SpaceX’s bug bounty program. Hosted on Bugcrowd, the program offers rewards of up to $50,000 for severe vulnerabilities like remote code execution, which could allow hackers to hijack systems or spread malware. Lesser but still significant rewards of $5,000 to $10,000 are available for vulnerabilities like cross-site scripting (XSS) and cross-site request forgery (CSRF), which could expose users to malicious attacks.
Here’s the kicker: SpaceX’s focus on cybersecurity comes at a critical time. As the company supplies wartime communications in Ukraine, it’s also ramping up its cybersecurity efforts by hiring additional staff. This dual focus on innovation and security highlights the challenges of protecting a global network that’s increasingly under scrutiny.
So, what does this all mean for Starlink users? While SpaceX’s proactive approach to security is commendable, the lack of transparency around this particular leak leaves questions unanswered. Is SpaceX doing enough to protect its users, or are there more vulnerabilities waiting to be discovered? Let us know your thoughts in the comments—this is one conversation that’s just getting started.