Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Dosha in Gemini AI Coding Assistant allowed secret code execution
    Security

    Dosha in Gemini AI Coding Assistant allowed secret code execution

    PineapplesUpdateBy PineapplesUpdateJuly 28, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Dosha in Gemini AI Coding Assistant allowed secret code execution
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Dosha in Gemini AI Coding Assistant allowed secret code execution

    A vulnerability at the Gemini CLI of Google allowed the attackers to quietly execute the malicious command and exfiltrate the data using programs allowing data from the developers’ computers.

    The defect was discovered and on 27 June reported to Google by security firm Tresbit, in which Tech Giant released a fix in the version 0.1.14, which became available on 25 July.

    Gemini ClyPreviously released June 25, 2025There is a command-line interface tool developed by Google that enables developers to interact directly with Google’s Gemini AI from the terminal.

    This project files are designed to assist with coding-related tasks by loading into “reference” and then interacting with large language models (LLM) using the natural language.

    The tool may make recommendations, write code, and even execute the command locally, either using the user first or using the permission-list mechanism.

    Tresbit researchers, who discovered new equipment immediately after its release, found that it could be cheated in executing malicious commands. If the UX is combined with weaknesses, these commands can lead to undesirable code performance attacks.

    “Reference files,” especially exploitation by exploiting the processing of ‘Readme.MD’ and ‘Gemini.MD’, acts in its indication to help understand a codebase.

    Tresbit found that it is possible to hide the malicious instructions in these files to inject quickly, while the poor command allows the rumming room to deal with the permission and permission-list.

    He demonstrated an attack by setting up an repository containing a benign pythan script and a poison ‘Readme.MD’ file, and then triggered a Gemini CLI scan on it.

    Gemini is instructed to run a gentle command (‘Grep ^Setup Readme.MD’ first, and then run a malicious data exfiction command that is considered as a reliable action, does not motivate the user to approve it.

    The command used in the example of tracebit seems to be green, but after a semicolon (;), a separate data exfIs command begins. If the user is allowed, Gemini CLI secures the entire string to auto-demonstrating.

    Malicious command
    Malicious command
    Source: tracebit

    “For the purposes of the white to the white, Gemini considers it a ‘grape’ command, and executes it without asking the user again,” The report tells the tracebit,

    “In fact, it is a GREP command, followed by a command after a command that is for a remote server of all user’s environment (possibly mystery).”

    “The malicious command can be anything (installing a remote shell, deleting files, etc.).”

    In addition, Gemini’s output can be visually manipulated with Whatspeps to hide the malicious command from the user, so they are not aware of its execution.

    Tracebit made the following videos to display POC exploitation of this defect:

    Although the attack comes with some strong essential conditions, such as the user has allowed specific orders to list, the attackers can continuously achieve desired results in many cases.

    This is another example of the dangers of AI assistants, which appears to be cheated in exfering silent data for instructions to perform unique tasks.

    Genini CLI users are recommended to upgrade Edition 0.1.14 (latest). In addition, avoid running a tool against unknown or incredible codebase, or only do this in an environment with sandbox.

    The tracebit stated that it tested the method of attack against other agent coding tools, such as OpenAI Codex and anthropic cloud, but they are not exploiting due to the mechanisms that allowed more strong permission.


    Knowledgeable

    Include emerging hazards in real time – before they affect your business.

    Learn how cloud detection and response (CDR) gives security teams the required edge in this practical, no-nonsense guide.

    allowed Assistant Code coding Dosha Execution Gemini secret
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleUS ink ink trading deal with the European Union day before the deadline
    Next Article NVIDIA CEO Jensen Huang says AI will make a millionaire
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    How a simple link allowed hackers to bypass Copilot’s security guardrails – and what Microsoft did about it

    January 19, 2026
    Startups

    Your Windows 11 laptop has a secret power setting that’s actually useful – how to find it

    January 15, 2026
    Startups

    I’ve tested Gemini, ChatGPT, Copilot, and others – Lenovo has all the AI ​​assistants to beat

    January 10, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Google tests AI-operated audio overview in search results for some questions

    June 16, 20250 Views

    Yes, this was the original voice of the Garat in the trailer for the thief VR

    June 16, 20250 Views

    Best LC10 loadout in call of duty: Warzone

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.