Post
HIGH

Hardcoded Google API Keys in Android Apps Expose Gemini AI Endpoints

· google · vulnerability · appsec · llm

Dozens of Google API keys hardcoded into Android applications can be extracted from decompiled APKs, granting unauthorized access to all Gemini AI endpoints. The exposed keys allow attackers to query Gemini models, potentially abusing compute quota at the application owner’s expense or accessing data routed through the API.

This is a credential hygiene issue reproducible at scale: developers embedding long-lived API keys directly in mobile app bundles. Developers should rotate any exposed keys immediately, adopt short-lived tokens or server-side proxying, and enforce API key restrictions (IP/referrer allowlists) to limit blast radius.