- Arc Raiders used Discord's Social SDK in a way that locally logged private DMs and auth tokens in plain text.
- The issue only affected players who enabled the Discord integration and data never left their PCs, according to Embark.
- Engineer and blogger Timothy Meadows uncovered the bug, prompting a rapid hotfix from Embark Studios.
- Discord is updating its Social SDK and guidance to developers to avoid similar privacy risks in future integrations.

For a short but worrying window of time, Arc Raiders players who linked their Discord accounts saw their private messages quietly written into local log files. What should have been a convenient way to chat with friends from inside the game briefly turned into an unexpected privacy headache.
The problem came to light when a system engineer and tech blogger, Timothy Meadows, dug into the game’s files and found that Discord direct messages and authentication tokens were being stored in plain text on players’ PCs. Embark Studios moved quickly with an urgent hotfix, but the incident has sparked a wider conversation about how social integrations in games are built and audited.
How Arc Raiders ended up logging Discord private messages
According to Meadows’ technical write‑up, the root of the issue lay in how Arc Raiders implemented Discord’s Social SDK as part of its in‑game integration, highlighting logging best practices.
The catch was that the SDK implementation wasn’t filtering what it was writing to disk. Instead of only recording minimal diagnostic information, the integration was effectively dumping almost everything it received into text‑based log files. That meant private conversations between two Discord users, along with security tokens and other sensitive data, could end up stored unencrypted in a folder on the user’s machine.
In practice, this turned the local logs into a detailed record of Discord DMs that were never intended to be saved by the game at all. The content did not appear in any obvious location from a user perspective, but anyone with access to the system file structure, malware included, could parse those logs and read the messages.
Meadows highlighted that this wasn’t some elaborate exploit chain. It was a straightforward consequence of the logging strategy: the integration captured too many events, and the logger wrote out too much raw data. From a developer’s point of view, it looked like an over‑verbose debug mode that had accidentally shipped into a live environment.
Security‑wise, the inclusion of Discord authentication tokens in plain text exacerbated the risk, a problem seen in other software bugs that exposed confidential emails. Those tokens are what allow software to access Discord APIs on behalf of a user. If an attacker obtained them from the log files, they could in theory impersonate the user, pull more data or manipulate their account until the tokens were revoked.
Discovering the bug and Embark’s rapid response
The situation only became public once Meadows shared his findings, first outlining the issue on his blog and then circulating the information through social channels. It did not take long for the story to gain traction among Arc Raiders players and the wider PC gaming community, especially given the sensitivity around private chats.
As attention grew, Embark Studios acknowledged the problem and confirmed that it stemmed from their use of the Discord Social SDK. They stressed that the behaviour was unintended and that there had been no attempt to harvest or process user messages for their own purposes.
The studio then pushed out an urgent update for the game. This hotfix disabled the problematic logging behaviour and adjusted how the Discord integration handled incoming data, so that sensitive information would no longer be written to the local log files.
Players were informed via the official Arc Raiders Discord server and through media outlets such as Insider Gaming. Embark explained what had gone wrong, reassured users about where the data was stored and outlined the steps being taken to audit the integration more thoroughly.
Timeline‑wise, community reports indicate that the fix arrived within a very short period after the bug went public. For example, a patch deployed on 5 March 2026 on PC is cited as the update that resolved the vulnerability, only a couple of days after the report began to circulate widely.
What data was affected and who was impacted?
From the information shared so far, only users who had explicitly activated the Discord integration inside Arc Raiders were exposed to this logging behaviour. If you never linked Discord or never turned on the feature in the game settings, your messages were not at risk from this particular bug.
The logs could include private Discord messages exchanged between two users, account‑related tokens and potentially additional Discord event data. All of this was stored as human‑readable text on the local drive, not encrypted or hidden behind any special protection layer.
Embark has consistently stated that none of the logged messages or tokens were transmitted from players’ PCs to their own servers or external infrastructure. In other words, the incident appears to have been confined to local storage on each affected machine, not a centralized database or cloud archive.
That distinction matters, but it does not make the situation entirely harmless. Any malware, malicious actor with physical access, or even shared‑PC user with enough knowledge to navigate folders could in theory open those plain‑text logs. Once there, they would see chunks of conversation history and the associated tokens.
For that reason, various commentators and security‑minded players have recommended taking extra precautions if you used the Discord integration before the hotfix. That can include revoking active Discord tokens, updating passwords for sensitive accounts and running a scan of your system to ensure nothing suspicious has been poking around your files.
Discord’s reaction and changes to the Social SDK
Following Embark’s fix, Discord itself weighed in on the situation in a statement shared with outlets such as Eurogamer. The company confirmed that it had worked with the Arc Raiders team to understand the bug and help guide the remediation process.
Discord noted that Embark had already shipped a quick correction and that Discord is now providing additional guidance to developers using the Discord Social SDK. The goal is to tighten protections so that sensitive data is less likely to be captured or stored unintentionally in future integrations.
Part of that effort involves updating the SDK with stronger built‑in safeguards and clearer best‑practice recommendations around logging. While the technical specifics have not been fully disclosed, the direction is clear: developers are being nudged to collect only the minimum information required for diagnostics and to avoid dumping raw event streams into log files.
The incident also serves as a reminder that middleware and third‑party SDKs can introduce risks even when the core game code is relatively solid. If an integration is treated as a black box, or debug configurations are not revisited before launch, unexpected data flows can slip through the cracks.
Discord’s message, in essence, is that it wants to work more closely with partner studios to review how its tools are used, perform security checks and prevent repeats of this kind of privacy slip. That includes examining how events are subscribed to, how long data is retained and which information should simply never hit a log file to begin with.
Why the Arc Raiders Discord bug worries players
For many players, the real shock here was not that a game had a bug, but that something as personal as private Discord messages could be quietly written to disk without any explicit warning. Even if the risk of a full‑blown breach was relatively low, the idea alone is unsettling.
There is also the broader context. Online games have faced a steady stream of security scares in recent years, from data leaks to exploit‑driven intrusions. Incidents involving titles like Rainbow Six Siege have kept privacy and security concerns in the spotlight, so the community is quick to scrutinize anything that touches their accounts and communications.
In this case, players linked their Discord accounts under the assumption that the integration would only handle presence, voice and basic social features. Few imagined that their direct messages might be swept up in verbose logs that were never meant to exist outside a development environment.
The Arc Raiders episode illustrates how well‑intentioned quality‑of‑life features can morph into liabilities if logging and data handling are not carefully managed. Social overlays, cross‑platform chats and account linking all rely on powerful APIs that, if misused, can expose far more than a username and avatar.
It also underscores the importance of independent researchers, hobbyist analysts and technically savvy players who routinely inspect files, network traffic and configuration data. Without Meadows’ curiosity and public report, this behaviour might have gone unnoticed for much longer.
What players can do now to stay on the safe side
Even with the hotfix deployed, some users prefer to take a cautious approach whenever private data may have been touched. If you used the Discord integration in Arc Raiders before the patch, there are a few steps you can consider.
First, you can revoke any active Discord sessions and refresh your authentication tokens. This can usually be done through Discord’s account settings by logging out of all active devices or resetting app authorizations, ensuring that any old tokens written to logs are no longer valid.
Second, you might want to review the game’s log directories on your PC and remove any files that may contain historic message data. While Embark’s fix should stop new data from being recorded inappropriately, deleting legacy logs can reduce the exposure window if someone were to gain access to your machine later.
Third, as a general habit, keeping your operating system, security tools and games up to date helps limit opportunities for malware to rummage through local files. A vulnerability in logging is much less dangerous if your system is otherwise locked down and regularly scanned.
Finally, incidents like this are a good moment to re‑evaluate how widely you link your main communication accounts to third‑party apps and games. Convenience is useful, but it is worth occasionally asking whether you actually need each integration enabled, especially on machines shared with other people.
Looking ahead, the Arc Raiders privacy scare has become a case study in how a combination of community vigilance, transparent communication from developers and swift technical remediation can contain a sensitive issue. The bug was real, the implications were serious, but the situation was addressed quickly, and both Embark Studios and Discord are now adjusting their practices to avoid a repeat, offering a pointed reminder that even small oversights in logging can have outsized effects when private conversations are involved.