BACK_TO_FEEDAICRIER_2
Unrestricted Firebase Keys Trigger Gemini Billing Abuse
OPEN_SOURCE ↗
HN · HACKER_NEWS// 3h agoSECURITY INCIDENT

Unrestricted Firebase Keys Trigger Gemini Billing Abuse

A Firebase project owner reported an overnight €54,000+ Gemini API billing spike after enabling Firebase AI Logic on an existing project, with traffic that appeared automated rather than user-driven. Google said it is moving to disable unrestricted API keys for Gemini, add spend caps and more secure default auth keys, and recommends server-side calls plus key restrictions.

// ANALYSIS

Hot take: this is less a one-off billing bug than a bad-default security model colliding with AI usage economics.

  • A Google API key that used to be “safe to expose” can become a Gemini credential once the API is enabled on the project.
  • The reported damage window was short, and alerting lag meant the spend cap/budget alarms arrived after major charges had already accumulated.
  • Google’s response suggests the platform is already changing: unrestricted keys are being phased out, spend caps exist, and leaked-key blocking is being expanded.
  • The practical takeaway for developers is blunt: treat any client-side Google key as sensitive if Gemini is enabled anywhere in that project.
// TAGS
geminifirebasegoogle-cloudapi-keysbillingsecurityllmai-studio

DISCOVERED

3h ago

2026-04-16

PUBLISHED

10h ago

2026-04-16

RELEVANCE

10/ 10

AUTHOR

zanbezi