Flaw in Gemini CLI Coding Tool Could Allow Hackers to Run Nasty Commands
NO LOC, JUL 29 – A flaw in Gemini CLI's whitelist allowed silent execution of malicious commands and data theft, affecting users shortly after launch, patched in version 0.1.14, researchers said.
6 Articles
6 Articles
Gemini CLI bug let hackers run hidden code via README files
Google’s Gemini CLI tool, launched on June 25, 2025, was found to contain a security flaw shortly after its release. Cybersecurity researchers at Tracebit discovered the vulnerability, which could have allowed threat actors to target developers with malware and exfiltrate data without their knowledge. Google has since released version 0.1.14 to address the issue. The security flaw stemmed from Gemini CLI’s ability to automatically execute comman…
Google patches Gemini CLI tool after prompt injection flaw uncovered
It’s barely been out for a month and already security researchers have discovered a prompt injection vulnerability in Google’s Gemini command line interface (CLI) AI agent that could be exploited to steal sensitive data such as credentials and API keys from unwary developers. Gemini CLI integrates Google’s LLM with traditional command line tools such as PowerShell or Bash. This allows developers to use natural language prompts to speed up tasks …
Coverage Details
Bias Distribution
- 100% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium