Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • Who we are
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI toolsNEW
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • Who we are
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Gemini CLI bug let hackers run hidden code via README files

Google’s Gemini CLI had a flaw that let attackers run hidden commands by exploiting trusted ones.

byAytun Çelebi
July 30, 2025
in Cybersecurity, News
Home News Cybersecurity
Share on FacebookShare on TwitterShare on LinkedInShare on WhatsAppShare on e-mail

Google’s Gemini CLI tool, launched on June 25, 2025, was found to contain a security flaw shortly after its release. Cybersecurity researchers at Tracebit discovered the vulnerability, which could have allowed threat actors to target developers with malware and exfiltrate data without their knowledge. Google has since released version 0.1.14 to address the issue.

The security flaw stemmed from Gemini CLI’s ability to automatically execute commands from a pre-approved allow-list. Tracebit researchers found that malicious instructions could be hidden within files such as README.md, which Gemini CLI reads. This allowed attackers to pair malicious commands with trusted ones.

In a test conducted by Tracebit, a seemingly harmless command was combined with a malicious command that exfiltrated sensitive information, including system variables and credentials, to an external server. Because Gemini CLI recognized the trusted command, it didn’t alert the user or request permission before executing the paired malicious command. Tracebit indicated that the malicious command could be concealed using specific formatting techniques, making it difficult for users to detect.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.


Shuyal malware is stealing data from 19 different browsers


“The malicious command could be anything (installing a remote shell, deleting files, etc),” the researchers explained, highlighting the potential severity of the vulnerability. While exploiting the flaw required some initial setup, including the presence of a trusted command on the allow-list, it presented a significant risk to developers using the tool.

Google addressed this vulnerability with the release of Gemini CLI version 0.1.14. Users are strongly advised to update to this version, or a newer one, as soon as possible. It is also recommended to exercise caution when running Gemini CLI on unfamiliar or untrusted code, unless operating within a sandboxed or secure testing environment, to avoid potential exploitation of this or other vulnerabilities.


Featured image credit

Tags: gemini

Related Posts

Substack goes for the living room with beta TV app launch

Substack goes for the living room with beta TV app launch

January 23, 2026
Google rolls out opt-in “Personal Intelligence” for AI Pro and Ultra users

Google rolls out opt-in “Personal Intelligence” for AI Pro and Ultra users

January 23, 2026
JBL launches AI-powered BandBox amps

JBL launches AI-powered BandBox amps

January 23, 2026
Blue Origin sets late February launch for third New Glenn mission

Blue Origin sets late February launch for third New Glenn mission

January 22, 2026
Anthropic overhauls hiring tests due to Claude AI

Anthropic overhauls hiring tests due to Claude AI

January 22, 2026
NexPhone launches triple OS phone for 9

NexPhone launches triple OS phone for $549

January 22, 2026

LATEST NEWS

Substack goes for the living room with beta TV app launch

Google rolls out opt-in “Personal Intelligence” for AI Pro and Ultra users

JBL launches AI-powered BandBox amps

Blue Origin sets late February launch for third New Glenn mission

Anthropic overhauls hiring tests due to Claude AI

NexPhone launches triple OS phone for $549

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Whitepapers
  • AI tools
  • Newsletter
  • + More
    • Glossary
    • Conversations
    • Events
    • About
      • Who we are
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.