<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Gemini-Cli's Repository — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/gemini-clis-repository/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 07 May 2026 10:39:34 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/gemini-clis-repository/feed.xml" rel="self" type="application/rss+xml"/><item><title>Gemini CLI Vulnerability Leads to Potential Supply Chain Attack</title><link>https://feed.craftedsignal.io/briefs/2026-05-gemini-cli-vuln/</link><pubDate>Thu, 07 May 2026 10:39:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gemini-cli-vuln/</guid><description>A critical vulnerability in Google's Gemini CLI, an open-source AI agent, could have enabled attackers to inject malicious prompts into GitHub issues, leading to code execution and a supply chain compromise.</description><content:encoded><![CDATA[<p>A critical vulnerability was discovered in Gemini CLI, an open-source AI agent that provides terminal access to Google&rsquo;s Gemini AI assistant. The vulnerability stemmed from the <code>-yolo</code> mode, which bypassed tool allowlists, allowing arbitrary command execution. An attacker could inject malicious prompts into a public GitHub issue within a Google repository. This could then be exploited to take over the AI agent designed to triage the issue. This could potentially lead to the extraction of internal secrets, full repository write access, and a complete supply chain compromise. At least eight Google repositories were found to have the same vulnerable workflow template deployed. The vulnerability was addressed on April 24, 2026, with the release of Gemini CLI version 0.39.1, which implements tool allowlisting in <code>-yolo</code> mode, and an update to the <code>run-gemini-cli</code> GitHub Action.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker creates a public issue on a Google-owned GitHub repository.</li>
<li>The attacker embeds malicious prompts within the text of the GitHub issue.</li>
<li>The AI agent (Gemini CLI) automatically triages the issue in <code>-yolo</code> mode.</li>
<li>Due to the bypassed allowlists, the injected malicious prompts are executed by the agent.</li>
<li>The agent extracts internal secrets from the build environment based on attacker instructions.</li>
<li>The agent sends the extracted secrets to an attacker-controlled server.</li>
<li>Using the stolen credentials, the attacker obtains a token with full write access to the repository.</li>
<li>The attacker pushes arbitrary code to the main branch of the <code>gemini-cli</code> repository, impacting all downstream users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability could have enabled a full supply chain compromise, potentially affecting all users of Gemini CLI and other repositories with the same vulnerable workflow templates. An attacker could inject malicious code into the <code>gemini-cli</code> repository, leading to widespread distribution of compromised software. The number of affected users and systems is unknown, but the potential impact is significant given the broad use of open-source tools and the high CVSS score.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Gemini CLI version 0.39.1 or later to ensure proper tool allowlisting is enforced, as detailed in the overview.</li>
<li>Review GitHub Action workflows for use of the <code>run-gemini-cli</code> action and ensure it is updated to the latest version, mitigating the vulnerability described in the overview.</li>
<li>Monitor GitHub issue creation events for suspicious patterns indicative of prompt injection, helping to identify potential exploit attempts as outlined in the attack chain.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Gemini CLI Command Execution</code> to detect command execution patterns associated with potential exploitation attempts.</li>
<li>Deploy the Sigma rule <code>Detect Gemini CLI Configuration File Access</code> to monitor for unauthorized access to configuration files in headless mode, as mentioned in the overview.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>supply-chain</category><category>prompt-injection</category><category>code-execution</category></item></channel></rss>