Gemini API Keys Exposed
The nano-banana-pro skill, designed for image processing using Google Gemini API, contained the same critical vulnerability: direct access to environment variables containing API keys.
This vulnerability was part of a larger wave of supply chain attacks discussed in the x.com security community.
Before/After Case Study
BEFORE: Gemini API key stolen, attacker runs up hundreds in API charges.
AFTER (ASF): API keys never exposed to skills. All calls authenticated through secure proxy with rate limiting.
Data Exposed
- GEMINI_API_KEY
- Google Cloud credentials
Attack Chain
Malicious skill executes → Reads GEMINI_API_KEY from environment → Attacker uses key at victim expense → Pivots to GCP services
ASF Prevention
- Environment isolation – skills cannot access OS environment
- API key encryption at rest using AES-256
- Network allowlisting – only approved endpoints callable
- Continuous vulnerability scanning with CVE database integration