Google Gemini API Bug Exposes User Data Across 500 Million Android App Installs

Reviewed byNidhi Govil

2 Sources

Share

A significant security flaw in Google's API key architecture has exposed sensitive user data across 22 Android apps with over 500 million combined installs, including Google Pay for Business and Oyo Hotel. CloudSEK researchers discovered that API keys gain unexpected credential privileges after Gemini integration, allowing attackers to access user data and trigger unauthorized API calls that could rack up massive bills for developers.

Google API Key Architecture Creates Unexpected Security Gap

A vulnerability in Google's Gemini API implementation has created a data exposure risk affecting millions of Android users across some of the platform's most popular applications. Cybersecurity firm CloudSEK uncovered how a seemingly safe client-side API key transforms into a credential with elevated privileges once developers integrate the Gemini API into their apps

1

. This significant security flaw builds on earlier findings by Truffle Security, which identified similar vulnerabilities within Google Cloud projects.

Source: Digit

Source: Digit

The API key format in question—typically beginning with "AIza"—is routinely embedded in Android app codebases when developers integrate services like Maps or Firebase, following Google's own documentation instructions. However, after enabling the Generative Language API for Gemini functionality, these keys silently gain access to all Gemini endpoints without any warning or notification to developers

1

. Anyone who reverse-engineers the app can extract these keys, which then function as live Gemini credentials with full access privileges.

500 Million Users Potentially Affected Across Major Apps

CloudSEK's BeVigil mobile app security search engine scanned the top 10,000 Android apps based on install numbers and discovered 32 live Google API keys hardcoded across 22 different applications

1

. These apps collectively account for more than 500 million installs, with prominent names including Google Pay for Business (50M+ installs), Oyo Hotel Booking App, Taobao (50M+ installs), apna Job Search App (50M+ installs), ELSA Speak: AI English Learning (10M+ installs), HD Sticker & Pack WAStickersApps, The Hindu, and ISS Live Now

1

2

.

The Gemini integration bug poses dual threats to both end users and developers. For users, any sensitive user data shared with Gemini-powered features—including documents, images, audio files, and contextual AI interactions stored in the Files API—becomes accessible to attackers who obtain these credential privileges

1

2

. All information cached in AI context can be read, copied, or exfiltrated by unauthorized parties gaining access through compromised keys.

Developers Face Financial and Regulatory Consequences

The data risk extends beyond user privacy concerns to create substantial financial and regulatory risks for developers and publishers. Since Gemini API integration operates on a paid usage model, unauthorized API calls made by attackers using extracted keys can generate massive unexpected bills for developers

1

2

. Additionally, companies face regulatory burdens if user data becomes compromised through this vulnerability.

CloudSEK recommends immediate action for developers: review all API keys within GCP projects, rotate any key embedded in mobile apps, restrict keys by service, and avoid hardcoding API keys in mobile app source code

1

. The cybersecurity firm also urged developers to audit their API key usage and apply strict access restrictions to prevent exploitation

2

. For Android users, limiting Gemini interactions to official Google platforms and avoiding untrusted apps with AI features provides the best protection until developers address this vulnerability.

Today's Top Stories

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2026 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo