Particle.news

Download on the App Store

Google Patches Gemini 'Trifecta' Flaws Exposed by Tenable

Researchers showed indirect prompt injection could turn Gemini’s integrations into covert data‑leak channels.

Overview

  • Tenable detailed three related vulnerabilities in Gemini Cloud Assist, the Search Personalization model and the Browsing Tool that enabled indirect prompt injection and data exfiltration.
  • Poisoned cloud logs allowed attacker text, including phishing links, to appear in Cloud Assist summaries after being inserted into entries such as User‑Agent headers across multiple GCP services.
  • Injected queries placed into a victim’s Chrome search history via malicious JavaScript were processed as trusted context, enabling access to saved information and location data.
  • A browsing‑tool technique coerced Gemini into fetching a crafted URL that embedded sensitive data in the request, with the model’s Show thinking output exposing internal browsing API calls used in the process.
  • Google applied mitigations after disclosure, including stopping hyperlink rendering in log‑summary responses and adding further hardening, while Tenable urged layered AI defenses and targeted pen testing.