Exposed Google API keys grant attackers free access to Gemini AI, costing developers thousands

Reviewed byNidhi Govil

3 Sources

Share

A critical security flaw in Google's API key architecture is allowing attackers to exploit Gemini AI without authorization, causing developers severe financial damage. CloudSEK discovered 32 exposed Google API keys across 22 Android apps with over 500 million combined installs, including OYO Hotel Booking App and Google Pay for Business. One solo developer faced a $15,400 bill, while a Japanese company saw $128,000 in unauthorized charges.

Google API Keys Transform Into Gemini AI Credentials Without Warning

A systemic security flaw in Google's API key architecture has turned seemingly harmless public identifiers into active authentication tokens for Gemini AI, exposing developers to catastrophic financial losses and putting millions of users at risk. CloudSEK researchers uncovered how Google API keys that developers embedded in Android apps for services like Maps or Firebase suddenly gain elevated privileges once the Gemini API is integrated, creating an API vulnerability that attackers are actively exploiting

1

.

Source: Digit

Source: Digit

The data exposure risk stems from a fundamental shift in how these client-side API keys function. What was previously considered safe to hardcode in applications according to Google's official guidance now provides direct access to Gemini AI infrastructure. Tuhin Bose, a cybersecurity researcher at CloudSEK, emphasized that "this issue does not stem from developer negligence; the implementations were compliant with Google's prescribed guidelines"

1

. The API key architecture effectively converted non-sensitive identifiers into live credentials, creating a vulnerability that persists across app update cycles.

Developers Face Devastating Financial Losses From Unauthorized Gemini AI Access

The financial impact on developers has been severe and immediate. A solo developer's startup nearly collapsed after attackers used a publicly accessible key to flood Gemini AI with inference requests, racking up $15,400 in charges despite revoking the key within minutes of receiving a billing alert

1

. The damage had already occurred due to reporting lag in Google Cloud's billing system, highlighting how quickly unauthorized API calls can devastate small businesses.

Source: TechRadar

Source: TechRadar

A Japanese company experienced approximately $128,000 in unauthorized Gemini API usage despite implementing firewall-level IP restrictions, demonstrating that traditional access restrictions proved ineffective against this Gemini API integration bug

1

. Meanwhile, a small development team in Mexico witnessed an $82,314 spike in just 48 hours—a dramatic 455-times increase over typical spending

1

. These financial losses for developers represent not just unexpected costs but existential threats to small businesses and startups.

Over 500 Million Android Users Affected Across Major Applications

CloudSEK's BeVigil mobile app security search engine scanned the top 10,000 Android apps and identified 32 exposed Google API keys across 22 different applications with more than 500 million installs collectively

2

. The affected apps include household names such as OYO Hotel Booking App, Google Pay for Business with 50M+ installs, Taobao with 50M+ installs, apna Job Search App with 50M+ installs, and ELSA Speak with 10M+ installs

2

3

.

Attackers who gain access through reverse-engineering these apps can exploit the vulnerability to access sensitive user data shared with Gemini AI, including documents, images, and audio files stored in the Files API

1

. Researchers confirmed actual data exposure in ELSA Speak when they successfully accessed user-submitted audio files via the Gemini Files API

1

. All sensitive information in the cached AI context can be read, copied, or exfiltrated by anyone gaining unauthorized access, creating significant data breaches risks for millions of users.

How the API Vulnerability Works and Why It Matters

The security flaw builds on earlier findings by Truffle Security, which identified similar risks in Google Cloud projects

2

. The API key format "AIza..." is typically added to Android apps when developers want to embed Maps or Firebase, following documentation instructions shared by Google

2

. However, after enabling the Generative Language API, the key gains access to all Gemini endpoints without any warning or notification to developers.

This means anyone who decompiles an app can easily extract the key, and it functions as a live Gemini credential

2

. The vulnerability allows attackers to perform unlimited Gemini API calls, exhaust organizational API quotas, and persist through app update cycles, severely impacting both developers and end users

1

. This exposure of hardcoded credentials demonstrates the risks inherent in assuming backward compatibility for modern AI-enabled cloud services.

Immediate Actions Required and Future Implications

CloudSEK recommends developers review all API keys in Google Cloud projects, rotate any key embedded in mobile apps, restrict keys by service, and avoid hardcoding any API key in mobile app source code

2

. Technical measures such as revoking keys and restricting project permissions can mitigate exposure, though the financial and operational impact on developers remains substantial .

For end users, the cybersecurity report advises caution when using Gemini AI services in Android apps. If users don't trust an app, they should limit their Gemini interaction to official platforms

2

. The incident also places a regulatory burden on companies if user data is compromised, suggesting that current practices for handling API keys and AI integrations require immediate reevaluation. Developers who followed Google's guidance now unknowingly hold live credentials to powerful AI tools without notification or opt-in prompts, raising questions about how cloud providers should handle the integration of new AI capabilities into existing infrastructure.

Today's Top Stories

TheOutpost.ai

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

Instagram logo
LinkedIn logo
Youtube logo
© 2026 TheOutpost.AI All rights reserved