A few months ago, it silently changed a assumption that many developers took for granted: the Google Cloud API keys that were placed on public websites for loads such as maps or videos ceased to be simply harmless identifiers. With Gemini's arrival and the possibility of enabling the API of generative models in projects, these keys also started to function as credentials that can authorize calls to the IA assistant and, in some cases, to associated private data.
The problem was highlighted by a research team that tracked the public picture of the web code: by analyzing a representative snapshot of the Internet index, they found thousands of Google keys visible in client code. This investigation, published by Truffle Security, reveals that about 2,800 live keys were exposed on publicly accessible pages and that in several cases those same keys could invoke Gemini's API. Among the findings are keys used by financial institutions, security companies and contracting firms, and even a key integrated into the public web of a Google product.

Traditionally, many Google Cloud keys were treated as non-critical: they served to identify billing or enable simple services in the browser - such as uploading Google Maps, inserting YouTube videos, or using Firebase on a web app - and were confident that reference or use limits were enough. However, when a project activates the Generative Language API, the same key can acquire additional privileges and allow anyone who can run models and access functionalities that were not previously available from the client code.
The practical consequence is double. On the one hand, there is the risk of exposure of information: targeted attacks using the key can try to read or manipulate data to which the service has access. On the other, and perhaps more immediate to many organizations, there is the economic cost: calls to large models are not free, and an aggressor who abuses an exposed key can cause important bills. As researchers point out, saturation of requests against a model with a broad context can result in thousands of dollars per day charged to the victim account.
The findings are based on analysis of a massive set of web pages and are not an anecdotal case. Truffle Security documented that several keys had been in public code for years and, after testing calls to Gemini endpoints to list models, confirmed that those keys worked for the new service. The investigation was notified to Google and, after an exchange of communications, the company classified the problem as a form of escalation of privileges for a specific service.
Google's response, according to statements collected by specialized media, included technical measures and operational recommendations: blocking access of leaked keys to Gemini, issuing proactive notifications when leaks are detected and adjusting the default range of new keys generated from AI Studio to be specific to Gemini. These actions help, but are not a substitute for appropriate safety hygiene in projects.
For developers and product managers this is an immediate audit obligation. It is essential to review the projects and check whether the Generative API is enabled; if so, all public keys or code drinks must be reviewed and rotated without delay. In addition, it is appropriate to review permissions, apply strict reference or IP restrictions where possible, and set quota limits and billing alerts to detect abnormal consumption.
Tools facilitate the detection of exposed secrets in repositories and public code; researchers themselves recommend TruffleHog as a starting point for scanning and finding keys that are accessible from the front or in mission histories. It is also worth reviewing the official Google guides on API key practices and authentication, which describe how to mitigate risks and set up more fine controls: Google Cloud documentation on API keys.
Beyond punctual cleaning, this raises a broader reflection on how the evolution of platforms and services can change the sensitivity of certain technical devices. Something that was considered relatively safe yesterday - a public key used to load a map - can now become a critical vector if the same credential begins to authorize access to generative IA or functions that had not been anticipated. It is therefore key to review assumptions, apply the principle of less privilege and professionalize the management of secrets.

In the operational field, implement server authentication for sensitive calls, use service accounts with minimum permissions, and separate the public use keys from those that have the ability to invoke powerful APIs are measures that reduce exposure. It is also recommended to maintain automatic processes that monitor the appearance of secrets in either the commons or the front and that require the rotation of committed credentials. Security documentation and best practices change with technology; the responsibility of the teams is to keep them up to date.
The incident also underlines the importance of collaboration between researchers and suppliers. The responsible detection and reporting by third parties helped to adopt blockages and controls in a rapidly changing service. For those who want to deepen the original research, the report and entry of the team that detected the exhibition are available on the Truffle Security blog, which details methodology and concrete examples: Truffle Security analysis. The media coverage of Google's statements and the scope of finding in media such as BleepingComputer.
If you manage projects with cloud services, do not leave it for later: check if your client code contains visible keys, identify which permissions have these credentials and act with rotation and restrictions. Security is not static; a key exposed today can become dangerous tomorrow by changes in platforms and the difference between a minor incident and a serious leak is often in the speed with which exposure is detected and corrected.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...