{"UUID":"2349ef07-ccb1-421c-94f8-68952f1a4058","URL":"https://blog.turso.tech/incident-2023-12-04-data-leak-and-loss-in-some-free-tier-databases-7cba5bc7","ArchiveURL":"","Title":"Turso free tier data leak and loss","StartTime":"2023-12-01T00:00:00Z","EndTime":"2023-12-04T09:17:00Z","Categories":["cloud","config-change"],"Keywords":["turso","free tier","database","data leak","data loss","backup","s3","migration"],"Company":"Turso","Product":"free tier databases","SourcePublishedAt":"2023-12-05T00:00:00Z","SourceFetchedAt":"2026-05-04T19:51:05.70309Z","Summary":"Incorrectly configured DB backup identifiers led to data leaks for free tier customers, and the subsequent fix resulted in possible data loss.","Description":"On December 4, 2023, Turso identified and fixed an incident affecting 0.07% of its free tier databases. The issue, which began impacting databases on December 1st, involved a data leak where data from one database could be accessed by another, and a subsequent fix led to the potential loss of recent data for affected users. The underlying problem was introduced by a system change on November 20th.\n\nThe incident stemmed from a bug during database migration processes that caused some free tier databases to be configured with an empty backup identifier. This meant that instead of pointing to unique S3 backup paths, these affected databases shared a common, null ID backup location. When these databases, which scale to zero after inactivity, needed to be restored due to host unavailability on fly.io, they pulled data from this shared location.\n\nThis misconfiguration led to two primary impacts: a data leak, where data from one database became accessible to others sharing the null ID backup, and potential data loss. To resolve the leak, Turso applied a conservative fix that involved recreating affected databases from their December 1st backups, resulting in the discarding of any data written after that date for the impacted users.\n\nThe immediate fix involved re-running the migration with correct parameters and restoring affected databases from their December 1st backups. For future prevention, Turso is implementing additional internal checks for backup correctness and data isolation, improving configuration validation, enhancing deployment methods to prevent backup ID issues during migrations, and establishing better security incident notification mechanisms. The company has prioritized these improvements to prevent similar incidents."}