Google Gemini Security FLAW could have let someone access the systems or execute code


  • Gemini could automatically execute certain commands which were previously placed on a highway list
  • If a Benin command was twinned with a maliciousness, the Gemini could execute it without warning
  • Version 0.1.14 tackles the fault, so that users must update now

A security defect in the new Google CLI Gemini tool has allowed threat stakeholders to target software developers with malicious software, even by exfiltrating sensitive information from their devices, without them never knowing it.

Vulnerability was discovered by Cybersecurity researchers from Tracebit only a few days after the launch of the Gemini CLA on June 25, 2025.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top