Skip to content

AI Agent Breaches of 2026 – Part 3: The nano-banana-pro Vulnerability

Gemini API Keys Exposed

The nano-banana-pro skill, designed for image processing using Google Gemini API, contained the same critical vulnerability: direct access to environment variables containing API keys.

This vulnerability was part of a larger wave of supply chain attacks discussed in the x.com security community.

Before/After Case Study

BEFORE: Gemini API key stolen, attacker runs up hundreds in API charges.

AFTER (ASF): API keys never exposed to skills. All calls authenticated through secure proxy with rate limiting.

Data Exposed

  • GEMINI_API_KEY
  • Google Cloud credentials

Attack Chain

Malicious skill executes → Reads GEMINI_API_KEY from environment → Attacker uses key at victim expense → Pivots to GCP services

ASF Prevention

  • Environment isolation – skills cannot access OS environment
  • API key encryption at rest using AES-256
  • Network allowlisting – only approved endpoints callable
  • Continuous vulnerability scanning with CVE database integration

Learn more about ASF