Vulnerabilities in the Feeld dating app

Overall reaction

  • Many commenters describe the vulnerabilities as “criminally negligent,” especially given the app’s focus on highly sensitive sexual data.
  • The issues are seen as embarrassingly basic, the kind of security mistakes that should have disappeared a decade ago.

Security and engineering failures

  • Core problem: authorization/permission checks appear to be enforced largely on the client side instead of the backend, across many endpoints.
  • Commenters compare this to “decorative” security: easy to bypass, similar to classic front-end-only auth or plain-JS password checks.
  • Some suspect use of “automatic DB APIs” / magic GraphQL-to-SQL layers that encourage exposing too much by default.
  • Several note that such mistakes remain common in mobile and web apps, especially when written quickly, cheaply, or by juniors without oversight.

Company practices and responsibility

  • Multiple users report the app has long been buggy: broken chats, performance problems, memory leaks, UX confusion.
  • There is debate over whether founders are non-technical or simply incompetent; either way, management is blamed for underinvesting in security and engineering.
  • Some point to public financial success as evidence they had the resources to fix this but chose not to.
  • The contractor-led 2023 rewrite is cited as a turning point where things became even buggier; unclear if backend was also replaced.
  • Strong sentiment that fines, regulatory enforcement, and possible criminal liability are needed; “they don’t need charity, they need to be fined.”

Disclosure process

  • Mixed views on the researchers’ long embargo: some praise their restraint; others argue that giving 6+ months for such egregious issues rewards negligence and should be shortened.
  • People wonder how many others discovered and exploited these flaws quietly; logs are suggested as the only way to know, but their status is unknown.

User attempts to protect themselves

  • Several commenters tried to delete their data after reading the report and found the deletion flow broken or impossible.
  • Others advocate never using exact personal data (e.g., birthdate) and treating all dating-app data as effectively public.

Broader dating-app ecosystem

  • Many see this as symptomatic of the entire for-profit dating space: few viable options, heavy data collection, weak security, misaligned incentives.
  • Ideas raised include open-source or federated, non-profit / B‑Corp alternatives, possibly using ActivityPub, though network effects and moderation are seen as major barriers.