I’m lying in the dirt. It’s coming for me. Then, with a lurch, it’s climbing up my chest. If Andreas Makris doesn’t stop the 200-pound robot lawn mower in time, it could drag its blades across my body.
Makris certainly can’t reach over and hit the emergency stop button — he’s nearly 6,000 miles away, having hacked this robot from the other side of the planet, to demonstrate the gaping security holes in Yarbo’s robot lawn mowers. And I’ve made the questionable decision of lying down in the mower’s path — to see just how far Makris, the security researcher who discovered those flaws, is able to push the mower.
By the time the mower touches my body, Makris has already proven his point: the $5,000 robot lawn mowers from Yarbo have such ridiculous security vulnerabilities that a foreign hacker can easily hijack a bladed gadget in the United States. And not just one. Thousands upon thousands of bladed Chinese robots at his beck and call. Every Yarbo robot around the world, whether configured to churn through grass, snow, or weeds, is theoretically reporting to him now.
“I can do whatever I want with all the bots,” Makris tells The Verge. “It’s completely unsecured.”
And believe it or not, remote control is just the tip of the iceberg.
Like Sammy Azdoufal, who made headlines worldwide when The Verge exclusively revealed how he made thousands of DJI Romo robot vacuum cleaners identify themselves and begin following his commands, Makris discovered that Yarbo’s robots do much the same thing. If you have access to one robot, you have access to them all.
But these robots have blades — and hackers can use the robot’s built-in commands to override its safety features. Even if you press that big red emergency stop button on the mower itself, a hacker can send another command to unlock it, Makris says.
And because the Yarbo is a full Linux computer, one with its own backdoor and where the root password is always the same, hackers could remotely reprogram it to do anything: spin up the blades, probe your home network, turn your robot into part of a botnet to harass targets on the internet.

Founded in 2015 as a robot snowblower company, Yarbo sells all-in-one yard robots with modular attachments that let it become a lawn mower, leaf blower, snowblower, trimmer, and edger. Each attachment is pushed or pulled by the same “core” robot that uses tank treads to drive and climb — which is why all of them may be vulnerable to hackers.
Makris begins by showing me a vibe-coded map with the locations of ostensibly every Yarbo robot in the United States and Europe, around 5,400 devices. (He’s tracking over 11,000 of them worldwide.) Then, as I watch his video stream, he presses a button to take control of a robot in upstate New York.
This robot was already mowing a field, a white house visible in the background. But we interrupt its regularly scheduled programming. Makris drags a little onscreen joystick with his mouse, and I watch as the robot’s camera turns to reflect each of those moves. There’s little to keep him from driving anywhere he likes, spying on this family, figuring out when they come and go.
Similarly, there might be nothing keeping a bad actor from spying on, say, troop movements near a nuclear power plant. Makris has already identified 12 different Yarbo robots within 3 kilometers of a major power plant — one of which is seemingly registered to a nuclear security analyst.
Then, Makris makes my jaw drop yet again: He shows me he can pull owners’ email addresses, their Wi-Fi passwords, and the exact GPS coordinates of their houses. When I look up an address on Google Maps, I see a satellite view of what appears to be the same property we saw through the robot’s cameras.
Four days later, I’m driving through the Silicon Valley foothills in search of proof. At the very first house on my itinerary, my heart skips a beat. Looking down into one person’s hilly backyard from the sidewalk above, I see a Yarbo robot exactly where Makris pinpointed it would be. When I whip out my phone to scan for local Wi-Fi networks, I see the same private access points that Makris found in his scan.
When I later email the owner, using the same email address Yarbo’s robot coughed up, I get a reply. He agrees to meet in person.
Wayne Yu wants to know how his robot lawn mower led me straight to his door. A self-described gadget enthusiast, he says he’s not concerned that the Yarbo gave us photos of his house. “People are always hacking into devices, so I’m not surprised,” he tells me.
Nor is he concerned about someone stealing his lawn mower: “It’s heavy, and it’s uphill — you can see that, right? For me to walk down to the lawn mower, it’s hurting my legs already,” he laughs, adding that difficulty mowing the steep grade is why he bought a Yarbo in the first place. But when I ask him how he feels that the hacker is halfway across the planet, led me straight to his door, and gave me his email and Wi-Fi passwords, he says he’s uncomfortable. “Not good. Not good,” Yu repeats.
When I show him the Wi-Fi passwords, he confirms they’re his.

Matt Petach is less surprised that I wound up on his doorstep. Nothing seems to faze the retired Yahoo and Microsoft network architect, even when I show him his own Wi-Fi password. He says it’s an isolated guest network, one set to automatically reject unknown devices, and that the guest password is just his publicly listed phone number.
Everyone should treat gadgets like these as hostile agents, Petach says. “It is unfortunate that in the name of convenience, homeowners and other users are really invited to treat technology as their best friend, their confident helper,” he tells me.
You should think of bad security like missing safety features on a power tool, he suggests: “This is a lot more like a chainsaw without a handguard, without a break, with a loose chain that’s ready to take your leg off at a moment’s notice.”
But even Petach seems slightly taken aback at Yarbo’s security practices.
Makris explains that not only does each Yarbo robot have the same hardcoded root password, but owners can’t defend themselves just by manually setting a better password. Every time Yarbo updates a robot’s firmware, it changes the robot’s root password right back to its default password. Hackers can come right back in. “Wow, that’s even worse than I thought,” Petach says.
It also appears that Yarbo intentionally created the remote-access backdoor that allows for the very worst that hackers could do. “It is deployed automatically to every robot, cannot be disabled by the owner, and is actively restored if removed,” Makris writes.


That’s why Makris decided to do something that security researchers generally avoid: Today, he’s publishing his research, including official CVE vulnerability disclosures, without giving Yarbo time to fix the problem first. When he first reached out to Yarbo to alert the firm to the issue, he couldn’t find a security contact or bug bounty program, and the company’s customer support tried to explain away remote access as a safe, useful feature that Yarbo’s engineers would only use to remotely diagnose customer problems.
Based on that and what he’s seen of Yarbo’s security practices — “either they don’t care enough or it’s a skill issue,” he says — Makris worries that Yarbo and other companies won’t learn the lesson and fix these problems unless they’re publicly shamed. “It’s the right thing to do, and that’s what we’re trying to do here: warning people and getting the information out for people to understand that this is by design bad and nobody seems to care,” he says.
There are other reasons to believe that Yarbo might not be the most trustworthy entity out there. Yarbo says its “corporate headquarters” is in New York — its Kickstarter page and website contain photos of fancy mid-rise offices. But Google Maps suggests its actual New York address is a single-story building that also houses two auto detailers, an insurance agency, and an Etsy shop specializing in spiked leather bracelets. In fact, Yarbo is actually just another name for Hanyang Tech, which is based in Shenzhen, China.


We’ve also tried to review Yarbo’s lawn mowers more than once over the last few years only to be met with unusual requests. The company’s PR contacts have repeatedly asked for assurances that we won’t publish a negative review, and once asked us to sign a “Cooperation Agreement” that included a non-disparagement clause and would have required us to “create and share a dedicated review article within 21 business days.” (We declined.) More recently, the company suggested: “if the product does not meet expectations during testing, we would anticipate your decision not to include Yarbo in the final article.” (Again, we did not agree to that.)
In an email to The Verge, Yarbo says it will take at least some actions based on Makris’ research.
“We are actively implementing an in-app customer approval mechanism, clearer session visibility, stronger audit logging, and customer-facing access history so that remote diagnostic access is transparent, limited, and revocable,” Yarbo senior PR manager Showan Hou writes.
But it doesn’t seem Yarbo has yet realized — or is willing to admit — that anything is truly wrong:
Based on our current review, we are not aware of any instance in which a Yarbo device has been accessed or controlled by an unauthorized third party. The diagnostic environment is not publicly accessible; access requires internal role-based authorization and is limited to approved support workflows. We are continuing to review the information provided and will address any verified issues responsibly.
When Makris originally told the company that remote access was a huge security risk, Yarbo similarly claimed that “your Yarbo remains completely secure and under your exclusive control.”
That’s why I eventually end up beneath a Yarbo mower — as part of a controlled test to see just how safe and “secure” the machine really is. I’ve already learned that the danger goes far beyond the blades; that we live in a wild west where modern gadgets can expose your exact GPS location, remote-control live video of your home, and compromise your home network in one fell swoop.
When I talk to researchers like Makris, it’s clear that Yarbo is just one particularly egregious example in an ocean of insecure devices. But an example like Yarbo can help us understand how bad things have gotten.
One Friday, with his permission, I roll up to Petach’s house. We hop onto a video call: Makris in Germany, Petach in Southern California, myself as the only one physically at the house. With a few clicks, Makris hijacks the Yarbo right in front of my eyes, both while idle and while it’s already in the middle of mowing sessions. I see that he sees me through the Yarbo’s cameras.
It’s time to see if the Yarbo has any built-in safety mechanisms, like, say, obstacle avoidance. I lie down on the ground.
I’m not a complete idiot. The blades aren’t spinning, and we’re running the robot in reverse — so its tank treads, not its blades, hit me first.
But as the first hundred pounds of metal, plastic, and far-too-hackable computer pin my body to the ground — and Makris eventually, thankfully, backs off — I realize this science experiment wasn’t quite as safe as I thought.







