Themata.AI
Themata.AI

Popular tags:

#developer-tools#ai-agents#llms#claude#ai-ethics#code-generation#openai#ai-safety#anthropic#open-source

AI is changing the world. Don't stay behind. Clear summaries, community insight, delivered without the noise. Subscribe to never miss a beat.

© 2026 Themata.AI • All Rights Reserved

Privacy

|

Cookies

|

Contact
googleapi-keysdeveloper-toolsgemini

Google API keys weren't secrets, but then Gemini changed the rules

Google API Keys Weren't Secrets. But then Gemini Changed the Rules. â Truffle Security Co.

trufflesecurity.com

February 25, 2026

18 min read

🔥🔥🔥🔥🔥

78/100

Summary

Google API keys, previously considered non-sensitive, can now be used by Gemini to access private user data. A scan of millions of websites revealed nearly 3,000 Google API keys that were originally deployed for public services.

Key Takeaways

  • Google API keys, previously considered safe for public use, can now access sensitive Gemini endpoints, allowing attackers to exploit them for unauthorized access to private data.
  • Nearly 3,000 Google API keys, originally deployed for public services, were found to authenticate to Gemini without any notification to developers.
  • The default setting for new API keys in Google Cloud is "Unrestricted," granting immediate access to all enabled APIs, including sensitive ones like Gemini.
  • Google retroactively expanded the privileges of existing API keys without warning, leading to potential security vulnerabilities for developers who followed previous guidelines.
Read original article

Community Sentiment

Negative

Concerns

  • Google's failure to standardize tests or specifications for API key security highlights a significant oversight, raising concerns about their commitment to user safety.
  • The retroactive privilege expansion of API keys without user notification poses serious risks, allowing unauthorized access to sensitive data and potentially leading to unexpected costs.
  • Allowing older, public keys to access the Gemini API without adequate safeguards demonstrates a lack of foresight in API security management, which could undermine trust in their services.

Related Articles

Google Cloud customer wakes up to $18,000+ bill despite $7 budget, thanks to forgotten API key in published project — attacker put in 60,000+ requests and blasted through $1,400 spending cap

Google Cloud customer wakes up to $18,000 bill despite $7 budget

Apr 22, 2026

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown | Wiz Blog

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown

Apr 28, 2026

Unexpected €54k billing spike in 13 hours: Firebase browser key without API restrictions used for Gemini requests

€54k spike in 13h from unrestricted Firebase browser key accessing Gemini APIs

Apr 16, 2026

Hacking Moltbook: AI Social Network Reveals 1.5M API Keys | Wiz Blog

Hacking Moltbook

Feb 2, 2026

Addressing Antigravity Bans & Reinstating Access · google-gemini/gemini-cli · Discussion #20632

Addressing Antigravity Bans and Reinstating Access

Feb 28, 2026