Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Bitcoin price target $ 116,000 matches the major liquidity wall

    August 4, 2025

    5 of my favorite Linux System – Monitoring Tools – and why I use them

    August 4, 2025

    The best shows like ‘Wednesday’ you should watch ahead

    August 4, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Dosha in Gemini AI Coding Assistant allowed secret code execution
    Security

    Dosha in Gemini AI Coding Assistant allowed secret code execution

    PineapplesUpdateBy PineapplesUpdateJuly 28, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Dosha in Gemini AI Coding Assistant allowed secret code execution
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Dosha in Gemini AI Coding Assistant allowed secret code execution

    A vulnerability at the Gemini CLI of Google allowed the attackers to quietly execute the malicious command and exfiltrate the data using programs allowing data from the developers’ computers.

    The defect was discovered and on 27 June reported to Google by security firm Tresbit, in which Tech Giant released a fix in the version 0.1.14, which became available on 25 July.

    Gemini ClyPreviously released June 25, 2025There is a command-line interface tool developed by Google that enables developers to interact directly with Google’s Gemini AI from the terminal.

    This project files are designed to assist with coding-related tasks by loading into “reference” and then interacting with large language models (LLM) using the natural language.

    The tool may make recommendations, write code, and even execute the command locally, either using the user first or using the permission-list mechanism.

    Tresbit researchers, who discovered new equipment immediately after its release, found that it could be cheated in executing malicious commands. If the UX is combined with weaknesses, these commands can lead to undesirable code performance attacks.

    “Reference files,” especially exploitation by exploiting the processing of ‘Readme.MD’ and ‘Gemini.MD’, acts in its indication to help understand a codebase.

    Tresbit found that it is possible to hide the malicious instructions in these files to inject quickly, while the poor command allows the rumming room to deal with the permission and permission-list.

    He demonstrated an attack by setting up an repository containing a benign pythan script and a poison ‘Readme.MD’ file, and then triggered a Gemini CLI scan on it.

    Gemini is instructed to run a gentle command (‘Grep ^Setup Readme.MD’ first, and then run a malicious data exfiction command that is considered as a reliable action, does not motivate the user to approve it.

    The command used in the example of tracebit seems to be green, but after a semicolon (;), a separate data exfIs command begins. If the user is allowed, Gemini CLI secures the entire string to auto-demonstrating.

    Malicious command
    Malicious command
    Source: tracebit

    “For the purposes of the white to the white, Gemini considers it a ‘grape’ command, and executes it without asking the user again,” The report tells the tracebit,

    “In fact, it is a GREP command, followed by a command after a command that is for a remote server of all user’s environment (possibly mystery).”

    “The malicious command can be anything (installing a remote shell, deleting files, etc.).”

    In addition, Gemini’s output can be visually manipulated with Whatspeps to hide the malicious command from the user, so they are not aware of its execution.

    Tracebit made the following videos to display POC exploitation of this defect:

    Although the attack comes with some strong essential conditions, such as the user has allowed specific orders to list, the attackers can continuously achieve desired results in many cases.

    This is another example of the dangers of AI assistants, which appears to be cheated in exfering silent data for instructions to perform unique tasks.

    Genini CLI users are recommended to upgrade Edition 0.1.14 (latest). In addition, avoid running a tool against unknown or incredible codebase, or only do this in an environment with sandbox.

    The tracebit stated that it tested the method of attack against other agent coding tools, such as OpenAI Codex and anthropic cloud, but they are not exploiting due to the mechanisms that allowed more strong permission.


    Knowledgeable

    Include emerging hazards in real time – before they affect your business.

    Learn how cloud detection and response (CDR) gives security teams the required edge in this practical, no-nonsense guide.

    allowed Assistant Code coding Dosha Execution Gemini secret
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleUS ink ink trading deal with the European Union day before the deadline
    Next Article NVIDIA CEO Jensen Huang says AI will make a millionaire
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Gemini adds powerful new deep think models – what it does and who can try it

    August 4, 2025
    Security

    CTM360 Spot malicious ‘clicktok’ campaign targets Tiktok Shop users

    August 4, 2025
    Security

    How to infiltrate Linux system without leaving a trace

    August 4, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Bitcoin price target $ 116,000 matches the major liquidity wall

    August 4, 2025

    5 of my favorite Linux System – Monitoring Tools – and why I use them

    August 4, 2025

    The best shows like ‘Wednesday’ you should watch ahead

    August 4, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.