Cross-Service Api Key Reuse And Retroactive Risk Expansion
Sources: 1 • Confidence: High • Updated: 2026-04-13 03:42
Key takeaways
- A single Google Cloud API key can be used across multiple Google services, including Gemini and Google Maps.
- Developers should audit their API keys to determine whether any are affected by cross-service Gemini access risk.
- Truffle Security identified 2,863 API keys in the November 2025 Common Crawl that could access Gemini, verifying access by calling the Gemini "/models" listing endpoint.
- A developer can enable Gemini billing on a Google Cloud project in a way that makes a previously public API key financially risky without rotating the key.
- Enabling the Gemini API on the same Google Cloud project can retroactively expand an existing API key's effective permissions, functioning like a privilege escalation over time.
Sections
Cross-Service Api Key Reuse And Retroactive Risk Expansion
- A single Google Cloud API key can be used across multiple Google services, including Gemini and Google Maps.
- A developer can enable Gemini billing on a Google Cloud project in a way that makes a previously public API key financially risky without rotating the key.
- Enabling the Gemini API on the same Google Cloud project can retroactively expand an existing API key's effective permissions, functioning like a privilege escalation over time.
Remediation And Operational Watch Items
- Developers should audit their API keys to determine whether any are affected by cross-service Gemini access risk.
- Google is working to revoke affected API keys associated with this issue.
Internet-Scale Evidence Of Exposed Keys With Gemini Access
- Truffle Security identified 2,863 API keys in the November 2025 Common Crawl that could access Gemini, verifying access by calling the Gemini "/models" listing endpoint.
Watchlist
- Developers should audit their API keys to determine whether any are affected by cross-service Gemini access risk.
Unknowns
- What exact Google Cloud settings (API restrictions, referrer/IP restrictions, service restrictions, project configuration) prevent an exposed key from being used to access Gemini or incur billing?
- Does successful access to the Gemini "/models" endpoint imply the ability to execute billable generation requests, or is it a lower-impact permission check?
- How many of the 2,863 identified keys remain valid today, and what fraction become invalid due to Google revocations versus owner rotation/restriction changes?
- What are the criteria used to classify a key as "affected" by the cross-service Gemini access issue, and how can developers deterministically test their own keys for that condition?
- What is the expected operational impact of any bulk key revocation (e.g., notice periods, error modes, or tooling for identifying dependencies on compromised keys)?