2 Sources
2 Sources
[1]
Google Bug Leaks Gemini AI Data in Google Pay, Oyo; Millions at Risk
Bad actors can steal user data and trigger unauthorised usage Google's implementation of an application programming interface (API) key architecture has reportedly led to a massive Gemini exposure risk in Android apps. As per the cybersecurity research firm CloudSEK, a particular client-side API key, which previously functioned as an identifier, receives credential privileges after an Android app integrates the Gemini API. This, in the hands of a bad actor, can expose the data users share with the chatbot. Additionally, this can also result in bad actors making unauthorised Gemini API calls, racking up huge bills for the developer. How a Google API Key Triggers Gemini Exposure In a blog post, CloudSEK explained how an API key (AIza...), which was deemed safe by Google to add to the codebase of Android apps, suddenly gains credential privileges after Gemini is integrated into the app. This security flaw builds on the findings of Truffle Security, which found a similar flaw on a Google Cloud project. CloudSEK's BeVigil, a mobile app security search engine, scanned the top 10,000 Android apps (based on number of installs) and found 32 live Google API keys hardcoded in 22 different apps with more than 500 million installs collectively. Some of these apps are Oyo Hotel, Google Pay for Business, Taobao, apna Job Search App, Elsa Speak, HD Sticker & Pack WAStickersApps, The Hindu, ISS Live Now, and more. Interestingly, the report claims that the API key format Alza... is added to the app when a developer wants to embed Maps or Firebase, as per the documentation instructions shared by Google. However, after enabling the Generative Language API, the key gains access to all Gemini endpoints without any warning or notification. So, anyone who decompiles the app can easily gain access to the key, and it acts like a live Gemini credential. For end users, this means any data shared with Gemini, such as documents, images, or audio, and stored in the Files API, can be accessed by the bad actor. Additionally, all sensitive information in the cached AI context can be read, copied, or exfiltrated by the one gaining unauthorised access. Developers and publishers also face significant risks. Gemini API integration is not free. Developers pay for any usage. So, if the bad actor ends up making unauthorised usage, it can rack up massive bills. Additionally, this also puts a regulatory burden on the companies if the users' data is compromised. CloudSEK recommends developers and companies review all API keys in a GCP project, rotate any key that is embedded in a mobile app, restrict keys by service, and not hardcode any API key in the mobile app source code. While end users cannot do much, they should be careful about using Gemini services in an Android app. If they do not trust the app, they should limit their Gemini interaction to the official app and platforms.
[2]
Gemini integration bug may put millions of Android users' data at risk: All you should know
Developers risk data breaches and unexpected costs from unauthorised Gemini API usage Ever since AI has seen rapid advancements, data exposure and leaks have become common terms that we hear every day, and it is dangerous. Yet again, a newly surfaced cybersecurity report has flagged potential data exposure risk tied to Google's Gemini integration in Android apps, including some big names, such as OYO Hotel Booking App, Google Pay for Business (50M+ installs), Taobao (50M+ installs), apna Job Search App (50M+ installs), ELSA Speak: AI English Learning (10M+ installs). According to findings by CloudSEK, a commonly used Google API key, which was previously considered safe for client-side use, can gain elevated privileges once the Gemini API is enabled, potentially allowing unauthorised access to sensitive data and services. The issue comes from API keys that developers often embed in the apps for services like Maps or Firebase. While these keys were initially designed to function as identifiers, the report claims that they can inadvertently turn into active credentials after Gemini's Generative Language API is integrated. This means that if a hacker extracts the key by reverse-engineering the app, they could gain access to Gemini endpoints without additional authentication. Also read: Apple iOS 26.4.1 update is here and it fixes a critical iCloud issue The report stated that it analysed 10,000 widely used Android apps and found dozens of exposed API keys across several apps with a combined install base of over 500 million. The report also stated that the vulnerability builds on earlier research by Truffle Security, which pointed to similar risks in the Google Cloud environment. For the users, this can be serious. Data shared with Gemini-powered features, including the files, images and contextual AI interactions, can become accessible if keys are compromised. At the same time, developers can face financial and regulatory risks as the attackers can misuse these keys to make unauthorised API calls. The report also urged developers to audit their API Key usage and avoid embedding sensitive keys directly in app code and apply strict access restrictions.
Share
Share
Copy Link
A significant security flaw in Google's API key architecture has exposed sensitive user data across 22 Android apps with over 500 million combined installs, including Google Pay for Business and Oyo Hotel. CloudSEK researchers discovered that API keys gain unexpected credential privileges after Gemini integration, allowing attackers to access user data and trigger unauthorized API calls that could rack up massive bills for developers.
A vulnerability in Google's Gemini API implementation has created a data exposure risk affecting millions of Android users across some of the platform's most popular applications. Cybersecurity firm CloudSEK uncovered how a seemingly safe client-side API key transforms into a credential with elevated privileges once developers integrate the Gemini API into their apps
1
. This significant security flaw builds on earlier findings by Truffle Security, which identified similar vulnerabilities within Google Cloud projects.
Source: Digit
The API key format in question—typically beginning with "AIza"—is routinely embedded in Android app codebases when developers integrate services like Maps or Firebase, following Google's own documentation instructions. However, after enabling the Generative Language API for Gemini functionality, these keys silently gain access to all Gemini endpoints without any warning or notification to developers
1
. Anyone who reverse-engineers the app can extract these keys, which then function as live Gemini credentials with full access privileges.CloudSEK's BeVigil mobile app security search engine scanned the top 10,000 Android apps based on install numbers and discovered 32 live Google API keys hardcoded across 22 different applications
1
. These apps collectively account for more than 500 million installs, with prominent names including Google Pay for Business (50M+ installs), Oyo Hotel Booking App, Taobao (50M+ installs), apna Job Search App (50M+ installs), ELSA Speak: AI English Learning (10M+ installs), HD Sticker & Pack WAStickersApps, The Hindu, and ISS Live Now1
2
.The Gemini integration bug poses dual threats to both end users and developers. For users, any sensitive user data shared with Gemini-powered features—including documents, images, audio files, and contextual AI interactions stored in the Files API—becomes accessible to attackers who obtain these credential privileges
1
2
. All information cached in AI context can be read, copied, or exfiltrated by unauthorized parties gaining access through compromised keys.Related Stories
The data risk extends beyond user privacy concerns to create substantial financial and regulatory risks for developers and publishers. Since Gemini API integration operates on a paid usage model, unauthorized API calls made by attackers using extracted keys can generate massive unexpected bills for developers
1
2
. Additionally, companies face regulatory burdens if user data becomes compromised through this vulnerability.CloudSEK recommends immediate action for developers: review all API keys within GCP projects, rotate any key embedded in mobile apps, restrict keys by service, and avoid hardcoding API keys in mobile app source code
1
. The cybersecurity firm also urged developers to audit their API key usage and apply strict access restrictions to prevent exploitation2
. For Android users, limiting Gemini interactions to official Google platforms and avoiding untrusted apps with AI features provides the best protection until developers address this vulnerability.Summarized by
Navi
28 Feb 2026•Technology

14 Jul 2025•Technology

20 Jan 2026•Technology

1
Technology

2
Technology

3
Science and Research
