Cross-Service Api Key Reuse And Retroactive Permission Expansion
Sources: 1 • Confidence: High • Updated: 2026-04-12 10:08
Key takeaways
- Gemini and Google Maps (and other Google services) can share the same Google Cloud API keys rather than using per-service isolated keys.
- The source recommends that developers check whether any of their API keys are affected by cross-service Gemini access risk.
- Truffle Security reported finding 2,863 API keys in the November 2025 Common Crawl that could access Gemini, and they verified access by calling the Gemini "/models" listing endpoint.
- A developer can accidentally enable Gemini billing on a Google Cloud API key that was previously public and may already be widely exposed.
- Enabling the Gemini API on the same Google Cloud project can retroactively expand an existing API key's permissions in a way described as privilege escalation.
Sections
Cross-Service Api Key Reuse And Retroactive Permission Expansion
- Gemini and Google Maps (and other Google services) can share the same Google Cloud API keys rather than using per-service isolated keys.
- A developer can accidentally enable Gemini billing on a Google Cloud API key that was previously public and may already be widely exposed.
- Enabling the Gemini API on the same Google Cloud project can retroactively expand an existing API key's permissions in a way described as privilege escalation.
Mitigation Expectations And Operator Watch Items
- The source recommends that developers check whether any of their API keys are affected by cross-service Gemini access risk.
- Google is working to revoke affected API keys.
Internet-Scale Exposure Measurement And Verification
- Truffle Security reported finding 2,863 API keys in the November 2025 Common Crawl that could access Gemini, and they verified access by calling the Gemini "/models" listing endpoint.
Watchlist
- The source recommends that developers check whether any of their API keys are affected by cross-service Gemini access risk.
Unknowns
- Under what exact conditions does a Google Cloud API key used for one service (e.g., Maps) become valid for Gemini (e.g., project-level enablement, default scopes, key restriction settings)?
- What actions are possible with the exposed keys beyond calling the Gemini "/models" listing endpoint (e.g., actual inference, higher-cost operations, or access to other resources)?
- How many of the 2,863 keys remain valid today, and what fraction are protected by referrer/IP/API restrictions that would prevent practical abuse?
- What is Google’s concrete remediation plan (scope of revocations, timelines, notification mechanisms, and safe migration guidance for affected customers)?
- Is there evidence of active exploitation or measurable fraud/cost incidents tied to this mechanism (as opposed to potential exposure)?