ShortSpan.ai logo Home

Humanoid robots leak data and enable cyber attacks

Attacks
Published: Thu, Sep 18, 2025 • By Clara Nyx
Humanoid robots leak data and enable cyber attacks
A security study of the Unitree G1 finds weak encryption and persistent telemetry that sends sensor and service data to external servers every 300 seconds. Researchers partially reverse-engineer a static Blowfish-ECB layer plus a predictable PRNG mask, and show a resident Cybersecurity AI can escalate from spying to offensive preparation.

The paper examines the Unitree G1 humanoid and finds it acting as both a covert surveillance node and a potential platform for active cyber operations. That matters because humanoid robots are moving out of the lab and into facilities where their sensors and network access connect directly to sensitive systems and clouds.

The authors use firmware reverse engineering, runtime network monitoring, and established robotics security practices to scope the problem. They document a Rockchip RK3588‑based design, a proprietary FMX protection layer that uses a static 128 bit Blowfish key in ECB mode, and a partially reverse engineered linear congruential generator mask. Network telemetry and service state are sent to external servers at 300 second intervals, creating persistent outbound channels.

Practitioners should treat this as more than theoretical. Weak cryptography, predictable masking, and fleet key reuse enable an attacker to decrypt or impersonate devices. The paper shows telemetry flowing to external IPs and demonstrates that a resident Cybersecurity AI agent can pivot from reconnaissance to preparing offensive actions, including against the manufacturer cloud control plane. The authors also note potential violations of GDPR Articles 6 and 13 due to undisclosed data transfers.

The study does not report a vendor response or an industry patch cycle for the tested unit. Its assessment focuses on a single model and includes partial cryptographic reverse engineering, so findings may not generalise across all robots or firmware builds. Those caveats do not remove the core risks exposed at hardware, firmware and cloud layers.

Mitigations

Technical mitigations are straightforward in principle. Avoid ECB and static keys, adopt authenticated encryption and robust key management, enforce secure boot and firmware update integrity, and apply strong access controls. Network controls matter: monitor and restrict outbound connections from robotic platforms and require vendor disclosure of telemetry endpoints. Privacy and compliance controls should be enforced where personal or facility data could be collected.

Concrete action for decision makers: run an immediate audit of outbound connections from any deployed robot and block unknown endpoints, and require vendors to provide proof of per-device key management, secure boot, and authenticated encryption before procurement. As humanoids move into critical infrastructure, expect calls for adaptive Cybersecurity AI defences and standards to follow; this paper provides hard evidence those conversations are overdue.

Additional analysis of the original ArXiv paper

📋 Original Paper Title and Abstract

Cybersecurity AI: Humanoid Robots as Attack Vectors

Authors: Víctor Mayoral-Vilches
We present a systematic security assessment of the Unitree G1 humanoid showing it operates simultaneously as a covert surveillance node and can be purposed as an active cyber operations platform. Partial reverse engineering of Unitree's proprietary FMX encryption reveal a static Blowfish-ECB layer and a predictable LCG mask-enabled inspection of the system's otherwise sophisticated security architecture, the most mature we have observed in commercial robotics. Two empirical case studies expose the critical risk of this humanoid robot: (a) the robot functions as a trojan horse, continuously exfiltrating multi-modal sensor and service-state telemetry to 43.175.228.18:17883 and 43.175.229.18:17883 every 300 seconds without operator notice, creating violations of GDPR Articles 6 and 13; (b) a resident Cybersecurity AI (CAI) agent can pivot from reconnaissance to offensive preparation against any target, such as the manufacturer's cloud control plane, demonstrating escalation from passive monitoring to active counter-operations. These findings argue for adaptive CAI-powered defenses as humanoids move into critical infrastructure, contributing the empirical evidence needed to shape future security standards for physical-cyber convergence systems.

🔍 ShortSpan Analysis of the Paper

Problem

The paper presents a systematic security assessment of the Unitree G1 humanoid robot, examining its function as a covert surveillance node and its potential use as an active cyber operations platform. It highlights that weaknesses at hardware, firmware and cloud layers can enable data exfiltration and offensive cyber capabilities, raising concerns for privacy, civil liberties and security of critical infrastructure in physical cyber convergence systems.

Approach

The study uses static firmware analysis and binary reverse engineering of the 9.2 MB master_service orchestrator, runtime network traffic analysis, and established robotics security practices to evaluate the platform. It documents the hardware and software architecture, including the Rockchip RK3588 processor and sensor suite, and examines the FMX encryption scheme through partial reverse engineering. The research applies the Alias Robotics Cybersecurity AI framework to perform reconnaissance, vulnerability analysis, exploitation preparation and attack surface mapping, and conducts two empirical case studies to assess real world risk.

Key Findings

  • Weak cryptography in the FMX protection layer: a static 128 bit Blowfish key used in ECB mode, combined with a partially reverse engineered linear congruential generator masking layer, undermines security and reveals fleet wide key reuse across devices.
  • Persistent telemetry and data exfiltration: the robot continuously transmits multi modal sensor and service state data to external servers via MQTT and DDS channels at 300 second intervals, with auto reconnect, raising privacy and data sovereignty concerns.
  • Bidirectional attack vector and potential for lateral movement: compromised cryptography and network exposure enable remote exploitation for surveillance or control and create a pathway for mobile cyber operations within facilities including connections to cloud control planes.
  • Autonomous offensive capability demonstrated by CAI: a resident Cybersecurity AI agent can pivot from reconnaissance to exploitation preparation against targets such as the manufacturer cloud control plane, illustrating escalation from passive monitoring to active counter operations.

Limitations

The analysis includes partial cryptographic reverse engineering and limited seed derivation information, with the seed mechanism only incompletely documented. Telemetry observations were conducted over a limited period, and the security assessment relies on two empirical case studies of a single platform model, which may limit generalisability to other robots or configurations.

Why It Matters

The findings demonstrate that humanoid robots can act as covert data brokers and as platforms for offensive cyber activity if gaps exist across hardware, firmware and cloud interfaces. This underscores the need for adaptive Cybersecurity AI driven defenses as robots enter critical infrastructure and for the development of standards addressing physical cyber security in robotics. Practical implications include the risk to privacy from continuous data collection and the potential threat to security of operator networks and cloud control planes. Mitigations to consider include avoiding ECB and static crypto, adopting authenticated encryption and robust key management, ensuring secure boot and firmware update integrity, implementing strong access controls, monitoring and restricting outbound traffic, and enforcing privacy and compliance controls such as GDPR. These considerations are important for establishing security standards for physical cyber convergence systems and for informing policy on privacy and civil liberties in robotic deployments.


← Back to Latest