Rsync is fast, simple, and deadly when turned against itself. When a directory syncs without proper authentication or restrictions, it becomes an open window into everything inside. Customer data. Source code. Private keys. Backups meant for safe storage, now browsable to anyone who guesses the right IP and port.
The danger is not theoretical. Open rsync daemons have leaked millions of files. Many were exposed for months before the issue made headlines. Search engines and scanning bots find these misconfigurations in hours. Once indexed, the data spreads beyond control.
The root cause is usually the same: rsync running in daemon mode on public interfaces without proper configuration. Lack of rsyncd.conf restrictions. Weak or missing authentication. Oversized access scopes. Sometimes the risk comes from automation scripts that assume a private network will stay private.