
TL;DR
- One DJI Romo vacuum proprietor tried to code an app to manage his vacuum with a PS5 controller.
- Inadequate authentication meant that he was in a position to entry knowledge streams from your complete fleet of DJI vacuums.
- DJI has since closed the bigger safety gap right here, however different points persist.
For all of the criticism AI rightfully attracts, we can also’t deny that it’s managed to decrease the barrier to entry throughout every little thing from enhancing photographs to creating music. That extends to making apps, and “vibe” coding has emerged as a surprisingly viable method for many people to get began with software program growth. However simply because AI can generate code doesn’t imply AI understands what it’s really doing, as one robotic vacuum proprietor just lately realized the exhausting method.
Sammy Azdoufal was trying to have some enjoyable along with his DJI Romo vacuum, and puzzled if he may be capable of hack collectively a approach to drive it round along with his PS5 controller. He informed The Verge about his makes an attempt, utilizing Anthropic’s Claude Code to research the DJI app and attempt to reverse engineer the protocol used to speak with the corporate’s vacuums.
Effectively, Claude did handle to crack that nut. However as Azdoufal rapidly realized, Claude might need squeezed just a little too exhausting, as a result of his remote-vacuum-control instrument immediately appeared to have entry to all of DJI’s vacuums — and never even simply these, but in addition the corporate’s energy stations.

These DJI units use the MQTT protocol to speak with firm servers and the app on customers’ telephones, and whereas the corporate did make use of authentication, that wasn’t tied to particular units — when you had one authentication token you may extract from a DJI app, you may use that to see everybody’s knowledge, in all places.
For these vacuums, that meant that Azdoufal was in a position to entry floorplan scans and even digicam feeds from strangers’ vacuums, hundreds of miles away. Whereas DJI finally closed the principle components of this loophole, stopping customers from accessing the units of others, there are extra vulnerabilities that also stay, like having the ability to override the PIN for viewing vacuum digicam feeds. And we solely learn about them as a result of AI helped construct an app that ended up a complete lot extra highly effective than anticipated.
Thanks for being a part of our neighborhood. Learn our Remark Coverage earlier than posting.

