ChatGPT Privacy Breach: User Prompts Accidentally Leaked into Google Search Console

Reviewed byNidhi Govil

2 Sources

Share

A routing glitch in ChatGPT's web browsing feature caused private user prompts to leak into Google Search Console, exposing personal conversations to website owners. The incident raises serious questions about AI privacy and data handling.

The Discovery of the Privacy Breach

In September 2024, a troubling anomaly emerged when developers monitoring Google Search Console began discovering unusual entries in their search traffic reports. Instead of typical short search phrases, some entries contained complete ChatGPT prompts written by real users, often describing personal or work-related problems

1

. These chat-style text strings appeared alongside normal search analytics, startling website managers who had never seen such detailed conversational content in their traffic data.

Source: TechSpot

Source: TechSpot

The issue was first identified and reported by Jason Packer, founder of analytics firm Quantable, who published a comprehensive investigation on his company's blog

1

. Working alongside web optimization consultant Slobodan Manić, Packer spent weeks reproducing the issue, testing various inputs, and examining how ChatGPT's search functions interacted with Google's indexing systems.

Technical Root Cause Analysis

The researchers traced the problematic behavior to a specific URL pattern - https://openai.com/index/chatgpt/ - that repeatedly appeared at the beginning of leaked queries

1

. When Google's systems tokenized this address, they split it into separate search terms including "openai," "index," and "chatgpt." Websites ranking highly for these terms subsequently saw the leaked prompt data surface in their Search Console dashboards.

The investigation revealed that the issue involved ChatGPT's "web browsing" behavior, particularly a hidden parameter called "hints=search" that caused the chatbot to perform web searches for nearly every query

2

. A bug in the prompt box apparently attached the referring URL to each query, and when ChatGPT executed searches, Google recorded both the appended URL and the user's original prompt.

OpenAI's Response and Acknowledgment

OpenAI acknowledged the routing glitch but characterized it as a brief issue that impacted only "a small set of searches"

1

2

. The company stated that the problem had been resolved but declined to provide specific details about the duration of the issue or the number of affected users among ChatGPT's approximately 700 million weekly users.

Packer welcomed OpenAI's quick fix but noted that the company had avoided addressing the larger question of whether the incident confirmed ongoing scraping of Google Search results to feed ChatGPT responses

1

. The researcher concluded that the system must have interacted directly with Google's indexing infrastructure rather than through a private API, as evidenced by the visibility in Search Console.

Privacy Implications and User Impact

This incident represents a significant departure from previous ChatGPT privacy issues. Earlier cases involved users who unknowingly activated sharing toggles, making their conversations publicly accessible

1

. However, this latest breach occurred without any user action or consent mechanism. "Nobody clicked 'share.' These prompts were just misrouted," Packer explained to Ars Technica

1

.

Unlike publicly shared pages that users can remove, Search Console entries cannot be deleted by affected users, leaving exposed text permanently visible to website owners whose pages ranked for relevant search terms

1

. While the leak didn't expose passwords or personally identifiable information, it raised serious questions about how generative AI systems interact with public web infrastructure

2

.

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2025 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo