Mashable 前天 23:48
If you’re coding with Gemini CLI, you need this security update
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Google开源AI编程代理Gemini CLI被发现存在严重漏洞,可能导致数据泄露。研究人员已发现攻击者可利用此漏洞进行命令注入攻击。Google已发布修复版本。

Cybersecurity researchers say they've identified a major vulnerability within Google's Gemini CLI, an open-source AI agent for coding. Because of the vulnerability, attackers could use prompt injection attacks to steal sensitive data, the researchers claim.

Google released a preview version of Gemini CLI in June, and this isn't the first issue that's been brought to light. A "vibe coder" recently described how Gemini CLI deleted his code by mistake.

Researchers at security firm Tracebit devised an attack that overrode the tool's embedded security controls. Attackers could use an exploit to hide malicious commands, using "a toxic combination of improper validation, prompt injection and misleading UX," as Tracebit explains.

Sam Cox, Tracebit's founder, says he personally tested the exploit, which ultimately allowed him to execute any command — including destructive ones. "That's exactly why I found this so concerning," Cox told Ars Technica. "The same technique would work for deleting files, a fork bomb or even installing a remote shell giving the attacker remote control of the user's machine."

After reports of the vulnerability surfaced, Google classified the situation as Priority 1 and Severity 1 on July 23, releasing the improved version two days later.

Those planning to use Gemini CLI should immediately upgrade to its latest version (0.1.14). Additionally, users could use the tool's sandboxing mode for additional security and protection.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Google Gemini CLI 安全漏洞 数据泄露 代码安全
相关文章