Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access
    Cybersecurity

    Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access

    adminBy adminApril 10, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Gemini
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Threat actors can extract Google API keys embedded in Android applications to gain access to Gemini AI endpoints and compromise data, CloudSEK warns.

    For over a decade, Google has said that API keys for public services such as Maps are not secrets, but recent research from Truffle Security showed that these keys can be used to authenticate to the Gemini AI assistant, potentially exposing personal data.

    “We scanned millions of websites and found nearly 3,000 Google API keys that now also authenticate to Gemini even though they were never intended for it. With a valid key, an attacker can access uploaded files, cached data, and charge LLM-usage to your account,” Truffle said in February.

    Further research from mobile security firm Quokka (formerly known as Kryptowire) led to the discovery of over 35,000 unique keys across 250,000 Android applications.

    “Because Android applications can be easily unpacked and inspected, extracting these keys requires minimal technical skill, and automated scraping at scale is entirely feasible. What used to be low-risk visibility has quietly turned into a meaningful attack surface,” Quokka said.

    Now, CloudSEK says it discovered that 32 Google API keys hardcoded in 22 popular Android apps provide unauthorized access to Gemini AI, potentially exposing sensitive data to attackers. The applications have a combined userbase of over 500 million.

    Advertisement. Scroll to continue reading.

    The exposure is to the developer’s Gemini resources and any data stored there. However, if the app processes and uploads real user data, those users’ submitted content can indirectly leak.

    The Google API keys, all using the ‘AIza…’ format, can be abused for retroactive privilege escalation: a key that a developer creates and embeds in their application provides access to all Gemini endpoints when the AI is enabled on the project.

    This happens automatically, without the developer’s knowledge, and provides anyone able to extract the key from a decompiled application with a live Gemini credential, CloudSEK notes.

    Armed with the key, an attacker could access private files and cached content, make arbitrary Gemini API calls, exhaust API quotas and disrupt legitimate services, and access any data on Gemini’s file storage, including documents, images, and other sensitive information.

    The presence of hardcoded Google API keys in applications significantly increases the attack surface, as the packages are public by design and the keys persist across version increments. What’s more, the keys are embedded based on Google’s own documentation recommendations, and not by error.

    “The proliferation of Google API keys in mobile app packages is a well-documented phenomenon in the mobile security research community. What is new – and what makes this finding particularly urgent – is that a class of keys previously considered harmless public identifiers has been silently elevated to sensitive AI credentials,” CloudSEK notes.

    Related: AI, APIs and DDoS Collide in New Era of Coordinated Cyberattacks

    Related: API Threats Grow in Scale as AI Expands the Blast Radius

    Related: Cyber Insights 2026: API Security – Harder to Secure, Impossible to Ignore

    Related: The New Rules of Engagement: Matching Agentic Attack Speed

    access Android API apps Endpoints Expose Gemini Google keys unauthorized
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleYouTube 90-second unskippable ads on TVs spotted
    Next Article Upstream network visibility is enterprise security’s new front line
    admin
    • Website

    Related Posts

    Gemini blocked more than 99% of bad ads before they ran in 2025

    April 16, 2026

    Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)

    April 16, 2026

    Cisco says critical Webex Services flaw requires customer action

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Gemini blocked more than 99% of bad ads before they ran in 2025

    April 16, 2026

    I tested the Moto G Stylus 2026, and it’s finally starting to feel like an affordable alternative to the Galaxy S26 Ultra, but the price tag makes it a tougher sell

    April 16, 2026

    IBM unveils security services for thwarting agentic attacks, automating threat assessment

    April 16, 2026

    What Is Answer Engine Optimization? And How to Do It

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,345)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (826)
    • Tech Tools & Mobile / Apps (1,611)
    • WiFi / Internet & Networking (226)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Gemini blocked more than 99% of bad ads before they ran in 2025

    April 16, 2026

    I tested the Moto G Stylus 2026, and it’s finally starting to feel like an affordable alternative to the Galaxy S26 Ultra, but the price tag makes it a tougher sell

    April 16, 2026

    IBM unveils security services for thwarting agentic attacks, automating threat assessment

    April 16, 2026
    Most Popular
    • Gemini blocked more than 99% of bad ads before they ran in 2025
    • I tested the Moto G Stylus 2026, and it’s finally starting to feel like an affordable alternative to the Galaxy S26 Ultra, but the price tag makes it a tougher sell
    • IBM unveils security services for thwarting agentic attacks, automating threat assessment
    • What Is Answer Engine Optimization? And How to Do It
    • Who goes there? Your Ring doorbell can now recognise up to 50 familiar faces, and let you know if a caller is a friend or a stranger
    • COSMIC desktop surprised me, because it’s the Linux DE I’ve been waiting for
    • Fortinet fixes critical FortiSandbox vulnerabilities (CVE-2026-39813, CVE-2026-39808)
    • Search Ad Growth Slows As Social & Video Gain Faster
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.