this is not just a database breach. users' signer uuids get stored in the db, but in order to use those and cast on the user's behalf you need the neynar api key associated with those signers. and the api key doesn't usually get stored in the db.
how did the api key get compromised?
there's more to this story