By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement
Computing

Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement

News Room
Last updated: 2026/02/28 at 5:21 AM
News Room Published 28 February 2026
Share
Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement
SHARE

New research has found that Google Cloud API keys, typically designated as project identifiers for billing purposes, could be abused to authenticate to sensitive Gemini endpoints and access private data.

The findings come from Truffle Security, which discovered nearly 3,000 Google API keys (identified by the prefix “AIza”) embedded in client-side code to provide Google-related services like embedded maps on websites.

“With a valid key, an attacker can access uploaded files, cached data, and charge LLM-usage to your account,” security researcher Joe Leon said, adding the keys “now also authenticate to Gemini even though they were never intended for it.”

The problem occurs when users enable the Gemini API on a Google Cloud project (i.e., Generative Language API), causing the existing API keys in that project, including those accessible via the website JavaScript code, to gain surreptitious access to Gemini endpoints without any warning or notice.

This effectively allows any attacker who scrapes websites to get hold of such API keys and use them for nefarious purposes and quota theft, including accessing sensitive files via the /files and /cachedContents endpoints, as well as making Gemini API calls, racking up huge bills for the victims.

In addition, Truffle Security found that creating a new API key in Google Cloud defaults to “Unrestricted,” meaning it’s applicable for every enabled API in the project, including Gemini.

“The result: thousands of API keys that were deployed as benign billing tokens are now live Gemini credentials sitting on the public internet,” Leon said. In all, the company said it found 2,863 live keys accessible on the public internet, including a website associated with Google.

The disclosure comes as Quokka published a similar report, finding over 35,000 unique Google API keys embedded in its scan of 250,000 Android apps.

“Beyond potential cost abuse through automated LLM requests, organizations must also consider how AI-enabled endpoints might interact with prompts, generated content, or connected cloud services in ways that expand the blast radius of a compromised key,” the mobile security company said.

“Even if no direct customer data is accessible, the combination of inference access, quota consumption, and possible integration with broader Google Cloud resources creates a risk profile that is materially different from the original billing-identifier model developers relied upon.”

Although the behavior was initially deemed intended, Google has since stepped in to address the problem.

“We are aware of this report and have worked with the researchers to address the issue,” A Google spokesperson told The Hacker News via email. “Protecting our users’ data and infrastructure is our top priority. We have already implemented proactive measures to detect and block leaked API keys that attempt to access the Gemini API.”

It’s currently not known if this issue was ever exploited in the wild. However, in a Reddit post published two days ago, a user claimed a “stolen” Google Cloud API Key resulted in $82,314.44 in charges between February 11 and 12, 2026, up from a regular spend of $180 per month.

We have reached out to Google for further comment, and we will update the story if we hear back.

Users who have set up Google Cloud projects are advised to check their APIs and services, and verify if artificial intelligence (AI)-related APIs are enabled. If they are enabled and publicly accessible (either in client-side JavaScript or checked into a public repository), make sure the keys are rotated.

“Start with your oldest keys first,” Truffle Security said. “Those are the most likely to have been deployed publicly under the old guidance that API keys are safe to share, and then retroactively gained Gemini privileges when someone on your team enabled the API.”

“This is a great example of how risk is dynamic, and how APIs can be over-permissioned after the fact,” Tim Erlin, security strategist at Wallarm, said in a statement. “Security testing, vulnerability scanning, and other assessments must be continuous.”

“APIs are tricky in particular because changes in their operations or the data they can access aren’t necessarily vulnerabilities, but they can directly increase risk. The adoption of AI running on these APIs, and using them, only accelerates the problem. Finding vulnerabilities isn’t really enough for APIs. Organizations have to profile behavior and data access, identifying anomalies and actively blocking malicious activity.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Costco Gas Pumps Make It Easier To Avoid Card Skimmers – Here’s How – BGR Costco Gas Pumps Make It Easier To Avoid Card Skimmers – Here’s How – BGR
Next Article Readers’ Choice Awards sweepstakes: Rate your audio devices for a chance to win a 0 Amazon gift card Readers’ Choice Awards sweepstakes: Rate your audio devices for a chance to win a $250 Amazon gift card
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

The 4 best color e-readers of 2026: The Kindle Scribe Colorsoft joins the ranks
The 4 best color e-readers of 2026: The Kindle Scribe Colorsoft joins the ranks
News
TurboSparse-LLM Performance: Outperforming Mixtral and Gemma with Extreme Sparsity | HackerNoon
TurboSparse-LLM Performance: Outperforming Mixtral and Gemma with Extreme Sparsity | HackerNoon
Computing
Euphoria Wouldn’t Exist Without This Wild British Drama Series Full Of Hollywood Stars – BGR
Euphoria Wouldn’t Exist Without This Wild British Drama Series Full Of Hollywood Stars – BGR
News
Pentagon moves to designate Anthropic as a supply-chain risk |  News
Pentagon moves to designate Anthropic as a supply-chain risk | News
News

You Might also Like

TurboSparse-LLM Performance: Outperforming Mixtral and Gemma with Extreme Sparsity | HackerNoon
Computing

TurboSparse-LLM Performance: Outperforming Mixtral and Gemma with Extreme Sparsity | HackerNoon

2 Min Read
The 7 Leading Requirements Management Software Solutions in 2026 | HackerNoon
Computing

The 7 Leading Requirements Management Software Solutions in 2026 | HackerNoon

0 Min Read
From San Francisco to the Sands: Why U.S. Tech Talent Is Eyeing the UAE | HackerNoon
Computing

From San Francisco to the Sands: Why U.S. Tech Talent Is Eyeing the UAE | HackerNoon

7 Min Read
The 5 Best Batsuits From Batman: Arkham Knight | HackerNoon
Computing

The 5 Best Batsuits From Batman: Arkham Knight | HackerNoon

7 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?