A developer wanted to control his DJI robot vacuum with a PlayStation 5 controller. To do that, he needed to understand how the device authenticated with DJI’s cloud platform. Using Claude Code to assist with the reverse engineering, he extracted the access key from his own device — and discovered it was effectively a master key for the entire platform.
With a single credential, he had access to the camera feeds, audio, and home floor plans of approximately 7,000 DJI vacuum customers. The floor plan detail is worth pausing on: robot vacuums map your home so they can clean it efficiently. That data doesn’t stay on the device. It sits on the manufacturer’s servers — in this case, with no segregation and no meaningful access controls between accounts.
He disclosed everything responsibly through DJI’s security channel. DJI fixed the issue entirely server-side — no client updates required, which confirms the failure was architectural rather than device-level. He reportedly received a $30,000 USD bug bounty.
Two things stand out. First, the researcher wasn’t a skilled hacker — AI-assisted development tools have significantly lowered the barrier to this kind of security research. Second, the root cause wasn’t a subtle vulnerability. It was a fundamental design failure: one credential, no account isolation, all data accessible. This is what ‘ship fast’ culture looks like when it meets connected device security — and it is one of the most common IoT security risks organisations and consumers face today.
DJI is a major, well-resourced brand. The same IoT security risks apply with even more force to the cheaper end of the market — the unbranded smart plugs, light switches, and cameras that ship in volume from manufacturers who have never had a security audit and never will.