Explore Problems
Showing 799 of 4,293 problems · matching your filters
Unauthorized Credit Cards Opened at Retail Point-of-Sale
Retail store employees open credit card accounts using customer IDs without obtaining consent or social security numbers, exploiting POS system vulnerabilities. Victims discover fraudulent accounts on credit reports months later with no clear dispute path.
Salesforce Locks Essential CRM Features Behind Expensive Add-On Tiers
Salesforce's pricing model places many of its most valuable features in premium add-on tiers, making the true cost of a functional deployment far higher than base plan pricing suggests. This tiered gating disproportionately affects mid-market companies that need advanced capabilities but cannot justify enterprise pricing. The practice has driven sustained interest in CRM alternatives with more transparent feature bundling.
Bank Fraud Algorithms Block Legitimate Purchases During Emergencies
Fraud detection systems flag legitimate purchases as suspicious when spending patterns shift during emergencies like natural disasters or displacement. The algorithms apply static behavioral models that cannot account for life disruptions. Cardholders are left unable to purchase essentials precisely when they most need access.
Synchrony Bank Processes Large Unauthorized Payments From Closed Accounts With No Explanation
Synchrony Bank initiated a $6,200 payment the consumer never authorized, claimed funds were coming from a closed bank account, and provided no clarity on how the transaction was possible or how to stop it. Consumer faces credit damage and fees with no resolution path.
Banks deny fraud disputes when victims were deceived into authorizing Zelle payments
Consumers targeted by impersonation scams — where fraudsters pose as legitimate vendors — are losing dispute claims because banks treat the payments as "authorized" even when the authorization was obtained through deception. Victims have no recourse once funds leave via Zelle. The problem is structural: payment networks lack liability frameworks for authorized-push-payment fraud.
npm Ecosystem Silently Executes Malicious Code via Transitive Dependencies
Every npm install is an implicit trust decision across hundreds of packages, any of which can execute arbitrary code via postinstall hooks with no user confirmation. The Axios backdoor attack demonstrated this at 80M weekly download scale, with sophisticated obfuscation and self-cleanup. Existing tools like Snyk detect known vulnerabilities but do not prevent silent postinstall execution from newly compromised accounts.
Identity Theft Causing Persistent Inaccurate Credit Reporting on TransUnion
Identity theft victims frequently find fraudulent accounts and inquiries persisting on their TransUnion credit reports, negatively impacting credit scores and financial standing. Disputing these inaccuracies requires navigating complex FCRA processes without adequate tooling support. The problem is high-frequency, structurally persistent, and affects millions of consumers.
Air-Gapped Networks Have No Passive Threat Detection Without Active Scanning Risk
Security teams protecting air-gapped environments — defense, ICS, nuclear — cannot use conventional network detection tools that require active probes, which risk triggering false alerts or disrupting critical operations. Passive monitoring that can identify C2 beacons and DNS generation algorithm traffic without sending any packets is absent from the market. This leaves some of the highest-value targets with a fundamental detection blind spot.
Phone Theft Enables Immediate High-Value Zelle and Venmo Fraud Banks Refuse to Refund
Thieves who steal unlocked phones can immediately execute thousands of dollars in Zelle and Venmo transfers before the owner can react. Payment apps treat physical phone possession as sufficient authorization, creating a structural gap where theft of a device equals theft of funds. Banks and payment platforms systematically deny fraud refunds for these transactions because the device was used directly.
Debt Collectors Report Paid Debts as Unpaid to Credit Bureaus
Collection agencies continue reporting debts as unpaid even after consumers provide clear payment documentation, forcing ongoing disputes. The credit reporting system has no real-time reconciliation mechanism, so paid debts linger as negatives while collectors ignore dispute evidence. This pattern repeats across millions of Americans managing past debt.
Bank of America Processes Unauthorized ACH Withdrawals After Written Revocation
Bank of America continued debiting a consumer's account after receiving a written revocation notice, ignoring the legal instruction and extracting funds without authorization. High mention count and upvotes confirm this is a widespread systemic failure at major banks.
Insurance policies lapse silently due to payment system errors
Autopay failures on insurance policies trigger silent policy cancellations with no customer notification, leaving homeowners unknowingly uninsured for months. The failure is compounded by siloed internal systems that prevent even the insurer's own support staff from diagnosing what happened.
Safety-Critical Professionals Cannot Search Large Technical Manuals Under Time Pressure
Pilots, engineers, and technicians must locate precise data buried in 600-page PDFs during time-sensitive workflows, but manual searching is slow and cloud AI tools require uploading sensitive or classified documents. The need for fast, accurate, offline document querying is unmet by current tools.
AI coding agents need full-computer sandboxes with memory forking and sub-second startup
AI coding agents require sandbox environments with full operating system capabilities — not lightweight containers — including the ability to fork running memory state to explore multiple execution paths simultaneously and snapshot mid-execution for later resumption. Existing container and VM solutions are either too slow to start, too limited in capability, or cannot fork state without pausing the entire environment. This missing infrastructure capability prevents entire categories of sophisticated agentic behavior.
Insurance Policies Deliberately Obscured With Jargon, Clauses Hidden Until Claims
Insurance contracts are routinely 50+ pages of dense legal language that consumers cannot meaningfully understand before signing. Critical exclusions and limitations only become apparent when a claim is filed and denied. This information asymmetry is structural and benefits insurers at the expense of policyholders.
Bank Accounts Opened Fraudulently Without Consumer Consent
Consumers discover new bank accounts opened in their name without any application or knowledge, indicating identity theft or bank error. The bank onboarding process lacks sufficient friction to prevent unauthorized account creation, leaving victims responsible for managing the fallout. This is a structural identity verification failure at major financial institutions.
Phantom Debt Collections Damaging Consumer Credit Without Recourse
Consumers are being subjected to credit report entries for debts they never incurred, with no effective mechanism to challenge collectors who ignore dispute requests. The harm is immediate — damaged credit scores block loans, housing, and employment — yet the dispute process gives collectors structural advantages over individuals. Victims have no reliable way to compel removal without expensive legal action.
Intercom Pricing Is Prohibitive for Startups and Small Businesses
Intercom charges per AI resolution ($0.99/resolution for Fin) on top of base subscription costs, making it unaffordable for small teams. Advanced features locked behind higher tiers further restrict smaller companies from getting full value.
Credit Bureaus Misreport Active Reaffirmed Loans as Discharged in Bankruptcy
After Chapter 13 bankruptcy discharge, lenders and credit bureaus incorrectly report reaffirmed auto loans as included in bankruptcy rather than active/current, causing significant credit score drops and blocking access to financing. Even after lenders acknowledge the error and promise corrections, bureaus take months to update records — or never do. With 93 mentions and 185 upvotes, this is a high-frequency, high-harm credit reporting failure.
Freelancers Cannot Afford Legal Contract Drafting
Freelancers and small businesses pay $300-$1800 per contract or skip legal protection entirely, risking non-payment and IP disputes.