This paper studies prompt spoofing attacks in text-to-image generation diffusion models. We highlight the weaknesses of existing numerical optimization-based prompt recovery methods and emphasize the importance of initial random numbers used during image generation. By exploiting a vulnerability (CWE-339) due to limited seed values (2 32 ) in PyTorch's CPU-based random number generation, we experimentally demonstrate that the seed values for approximately 95% of images on the CivitAI platform can be recovered within 140 minutes using a tool called SeedSnitch. Using the recovered seeds, we propose PromptPirate, a genetic algorithm-based prompt spoofing method that achieves 8-11% higher LPIPS similarity than existing state-of-the-art methods (PromptStealer, P2HP, and CLIP-Interrogator). Finally, we present effective countermeasures to neutralize seed and optimization-based prompt spoofing and disclose our collaborative efforts with relevant developers to address these vulnerabilities.