Model Comparison 100% sign agreement
Model Editorial Structural Class Conf SETL Theme
@cf/meta/llama-3.3-70b-instruct-fp8-fast lite 0.00 ND Neutral 0.80 0.00 Digital Security
@cf/meta/llama-4-scout-17b-16e-instruct lite +0.10 ND Mild positive 0.80 0.00 data privacy
deepseek/deepseek-v3.2-20251201 +0.30 +0.03 Mild positive 0.05 0.34 Privacy & Security
claude-haiku-4-5-20251001 +0.26 -0.05 Mild positive 0.17 0.37 Data Security & Privacy
meta-llama/llama-3.3-70b-instruct:free ND ND
Section @cf/meta/llama-3.3-70b-instruct-fp8-fast lite @cf/meta/llama-4-scout-17b-16e-instruct lite deepseek/deepseek-v3.2-20251201 claude-haiku-4-5-20251001 meta-llama/llama-3.3-70b-instruct:free
Preamble ND ND ND 0.20 ND
Article 1 ND ND ND 0.15 ND
Article 2 ND ND ND 0.10 ND
Article 3 ND ND ND ND ND
Article 4 ND ND ND ND ND
Article 5 ND ND ND ND ND
Article 6 ND ND ND ND ND
Article 7 ND ND ND ND ND
Article 8 ND ND ND ND ND
Article 9 ND ND ND ND ND
Article 10 ND ND ND ND ND
Article 11 ND ND ND ND ND
Article 12 ND ND 0.17 0.14 ND
Article 13 ND ND ND 0.25 ND
Article 14 ND ND ND ND ND
Article 15 ND ND ND ND ND
Article 16 ND ND ND ND ND
Article 17 ND ND ND 0.30 ND
Article 18 ND ND ND 0.20 ND
Article 19 ND ND 0.22 0.55 ND
Article 20 ND ND ND 0.25 ND
Article 21 ND ND ND ND ND
Article 22 ND ND ND ND ND
Article 23 ND ND ND ND ND
Article 24 ND ND ND ND ND
Article 25 ND ND ND ND ND
Article 26 ND ND 0.20 ND ND
Article 27 ND ND ND 0.30 ND
Article 28 ND ND ND ND ND
Article 29 ND ND ND 0.20 ND
Article 30 ND ND ND ND ND
+0.26 Google API Keys Weren't Secrets. But Then Gemini Changed the Rules (trufflesecurity.com S:-0.05 )
1280 points by hiisthisthingon 4 days ago | 304 comments on HN | Mild positive Editorial · v3.7 · 2026-02-26 02:14:30 0
Summary Data Security & Privacy Acknowledges
This technical blog post discusses how API key classification practices have changed with the introduction of AI models like Gemini, which can now detect and exploit previously non-secret credentials. The article acknowledges privacy, information security, and property rights by explaining the evolving threat landscape and emphasizing the importance of understanding what constitutes sensitive information. Overall, the content recognizes the need to adapt security practices to protect systems and data.
Article Heatmap
Preamble: +0.20 — Preamble P Article 1: +0.15 — Freedom, Equality, Brotherhood 1 Article 2: +0.10 — Non-Discrimination 2 Article 3: ND — Life, Liberty, Security Article 3: No Data — Life, Liberty, Security 3 Article 4: ND — No Slavery Article 4: No Data — No Slavery 4 Article 5: ND — No Torture Article 5: No Data — No Torture 5 Article 6: ND — Legal Personhood Article 6: No Data — Legal Personhood 6 Article 7: ND — Equality Before Law Article 7: No Data — Equality Before Law 7 Article 8: ND — Right to Remedy Article 8: No Data — Right to Remedy 8 Article 9: ND — No Arbitrary Detention Article 9: No Data — No Arbitrary Detention 9 Article 10: ND — Fair Hearing Article 10: No Data — Fair Hearing 10 Article 11: ND — Presumption of Innocence Article 11: No Data — Presumption of Innocence 11 Article 12: +0.14 — Privacy 12 Article 13: +0.25 — Freedom of Movement 13 Article 14: ND — Asylum Article 14: No Data — Asylum 14 Article 15: ND — Nationality Article 15: No Data — Nationality 15 Article 16: ND — Marriage & Family Article 16: No Data — Marriage & Family 16 Article 17: +0.30 — Property 17 Article 18: +0.20 — Freedom of Thought 18 Article 19: +0.55 — Freedom of Expression 19 Article 20: +0.25 — Assembly & Association 20 Article 21: ND — Political Participation Article 21: No Data — Political Participation 21 Article 22: ND — Social Security Article 22: No Data — Social Security 22 Article 23: ND — Work & Equal Pay Article 23: No Data — Work & Equal Pay 23 Article 24: ND — Rest & Leisure Article 24: No Data — Rest & Leisure 24 Article 25: ND — Standard of Living Article 25: No Data — Standard of Living 25 Article 26: ND — Education Article 26: No Data — Education 26 Article 27: +0.30 — Cultural Participation 27 Article 28: ND — Social & International Order Article 28: No Data — Social & International Order 28 Article 29: +0.20 — Duties to Community 29 Article 30: ND — No Destruction of Rights Article 30: No Data — No Destruction of Rights 30
Negative Neutral Positive No Data
Aggregates
Editorial Mean +0.26 Structural Mean -0.05
Weighted Mean +0.27 Unweighted Mean +0.24
Max +0.55 Article 19 Min +0.10 Article 2
Signal 11 No Data 20
Volatility 0.12 (Medium)
Negative 0 Channels E: 0.6 S: 0.4
SETL +0.37 Editorial-dominant
FW Ratio 50% 18 facts · 18 inferences
Evidence 17% coverage
1H 6M 4L 20 ND
Theme Radar
Foundation Security Legal Privacy & Movement Personal Expression Economic & Social Cultural Order & Duties Foundation: 0.15 (3 articles) Security: 0.00 (0 articles) Legal: 0.00 (0 articles) Privacy & Movement: 0.20 (2 articles) Personal: 0.25 (2 articles) Expression: 0.40 (2 articles) Economic & Social: 0.00 (0 articles) Cultural: 0.30 (1 articles) Order & Duties: 0.20 (1 articles)
HN Discussion 9 top-level · 2 replies
selridge 2026-02-26 02:39 UTC link
Great write-up. Hilarious situation where no one (except unwieldiness) is the villain.
bpodgursky 2026-02-26 04:05 UTC link
ChatGPT writing a blog post attacking Gemini security flaws. It's their world now, we're just watching how it plays out.
warmedcookie 2026-02-26 04:10 UTC link
What's frustrating is that a lot of these keys were generated a long time ago with a small amount of GCP services that they could connect to. (Ex. Firebase remote config, firestore, etc.)

When Gemini came around, rather than that service being disabled by default for those keys, Gemini was enabled, allowing exploiters to easily utilize these keys (Ex. a "public" key stored in an APK file)

devsda 2026-02-26 04:13 UTC link
> Leaked key blocking. They are defaulting to blocking API keys that are discovered as leaked and used with the Gemini API.

There are no "leaked" keys if google hasn't been calling them a secret.

They should ideally prevent all keys created before Gemini from accessing Gemini. It would be funny(though not surprising) if their leaked key "discovery" has false positives and starts blocking keys from Gemini.

the_arun 2026-02-26 04:15 UTC link
Private data should not be allowed to be accessed using public keys. That is the core problem. It is not about Google API keys are secret or not.
habosa 2026-02-26 04:17 UTC link
This is true but also not as new as the author claims. There have been various ways to abuse Google API keys in the past (at least to abuse them financially) and it’s always been very confusing for developers.
827a 2026-02-26 04:22 UTC link
Is the implication at the end that Google has not actually fixed this issue yet? This is really bad; a massive oversight, very clearly caused by a rush to get Gemini in customers' hands, and the remediation is in all likelihood going to nuke customer workflows by forcing them to disable keys. Extremely bad look for Google.
evo 2026-02-26 04:38 UTC link
Can’t wait til someone makes a Gemini prompt to find these public keys and launch a copy of itself using them.
louison11 2026-02-26 04:41 UTC link
This seems so… obvious? How can a company of this size, with its talent and expertise, not have standardized tests or specs preventing such a blatant flaw?
bryanrasmussen 2026-02-26 04:11 UTC link
How do you know that this blog post was written by ChatGPT?
827a 2026-02-26 04:36 UTC link
Yeah its tremendously unclear how they can even recover from this. I think the most selective would be: they have to at minimum remove the Generative Language API grant from every API key that was created before it was released. But even that isn't a full fix, because there's definitely keys that were created after that API was released which accidentally got it. They might have to just blanket remove the Generative Language API grant from every API key ever issued.

This is going to break so many applications. No wonder they don't want to admit this is a problem. This is, like, whole-number percentage of Gemini traffic, level of fuck-up.

Jesus, and the keys leak cached context and Gemini uploads. This might be the worst security vulnerability Google has ever pushed to prod.

Editorial Channel
What the content says
+0.55
Article 19 Freedom of Expression
High Advocacy Framing
Editorial
+0.55
SETL
ND

Content directly advocates for free expression of technical information about security practices. The article is published in a blog format without editorial restrictions and discusses evolving security standards. The title itself is a statement about freedom to discuss changing rules and practices.

+0.35
Article 12 Privacy
Medium Framing Practice
Editorial
+0.35
SETL
+0.37

Content directly addresses API key classification and exposure as a privacy and information security matter. The article discusses how data can be exposed through credential exposure and advocates for understanding what constitutes a secret. Framing emphasizes the importance of protecting access to systems and information.

+0.30
Article 17 Property
Medium Framing
Editorial
+0.30
SETL
ND

Content addresses protection of property and systems through security practices. The article discusses how API key exposure can lead to unauthorized access to systems and data, which relates to protection of property interests.

+0.30
Article 27 Cultural Participation
Medium Framing
Editorial
+0.30
SETL
ND

Content relates to participation in cultural and scientific life through technical knowledge sharing. The article discusses security practices and standards, which are part of shared technological culture and scientific understanding of information security.

+0.25
Article 13 Freedom of Movement
Medium Framing
Editorial
+0.25
SETL
ND

Content implicitly supports freedom of movement and residence by discussing security practices that protect system access and integrity. The article does not restrict access to information based on geographic location.

+0.25
Article 20 Assembly & Association
Medium Framing
Editorial
+0.25
SETL
ND

Content discusses security practices and standards, which relate to peaceful assembly and association in the context of collective security practices. The article does not address this right directly, but discusses shared standards and practices.

+0.20
Preamble Preamble
Medium Framing
Editorial
+0.20
SETL
ND

Content discusses dignity and respect in the context of API security practices and responsible disclosure. Framing emphasizes the importance of understanding security boundaries and protecting information systems, which relate to protection of dignity and property.

+0.20
Article 18 Freedom of Thought
Low Framing
Editorial
+0.20
SETL
ND

Content implicitly recognizes freedom of thought and conscience by presenting technical information objectively and allowing readers to form their own security practices and understanding. The article discusses evolving practices without imposing a single ideology.

+0.20
Article 29 Duties to Community
Low Framing
Editorial
+0.20
SETL
ND

Content implicitly acknowledges limitations and duties by discussing security responsibilities and practices. The article addresses how organizations and developers have duties to classify and protect credentials appropriately.

+0.15
Article 1 Freedom, Equality, Brotherhood
Low Framing
Editorial
+0.15
SETL
ND

Content implicitly recognizes that security practices protect the equal dignity and equal rights of all users by establishing clear boundaries. The article discusses how classification of API keys affects security posture for all.

+0.10
Article 2 Non-Discrimination
Low Framing
Editorial
+0.10
SETL
ND

The article does not directly address discrimination, but its focus on clear, consistent security practices suggests opposition to arbitrary exclusions or distinctions without reasonable basis.

ND
Article 3 Life, Liberty, Security
ND

No content directly addressing right to life, liberty, or personal security in relation to physical or existential threats.

ND
Article 4 No Slavery
ND

No content addressing slavery or servitude.

ND
Article 5 No Torture
ND

No content addressing torture or cruel treatment.

ND
Article 6 Legal Personhood
ND

No content addressing right to recognition as a person before the law.

ND
Article 7 Equality Before Law
ND

No content addressing equal protection under the law.

ND
Article 8 Right to Remedy
ND

No content addressing right to effective remedy for violations.

ND
Article 9 No Arbitrary Detention
ND

No content addressing arbitrary arrest or detention.

ND
Article 10 Fair Hearing
ND

No content addressing fair trial or due process.

ND
Article 11 Presumption of Innocence
ND

No content addressing criminal law principles.

ND
Article 14 Asylum
ND

No content addressing right to seek asylum.

ND
Article 15 Nationality
ND

No content addressing nationality rights.

ND
Article 16 Marriage & Family
ND

No content addressing marriage or family rights.

ND
Article 21 Political Participation
ND

No content addressing political participation.

ND
Article 22 Social Security
ND

No content addressing social security or welfare rights.

ND
Article 23 Work & Equal Pay
ND

No content directly addressing labor rights, work conditions, or fair wages. Content discusses security practices relevant to workers but does not address labor rights explicitly.

ND
Article 24 Rest & Leisure
ND

No content addressing rest and leisure rights.

ND
Article 25 Standard of Living
ND

No content addressing adequate standard of living or health rights.

ND
Article 26 Education
ND

No content addressing education rights.

ND
Article 28 Social & International Order
ND

No content addressing social and international order required for rights to be realized.

ND
Article 30 No Destruction of Rights
ND

No content addressing prohibition of destruction of rights.

Structural Channel
What the site does
Element Modifier Affects Note
Legal & Terms
Privacy
Google Analytics tracking present (gtag). Privacy policy not accessible from provided content.
Terms of Service
Terms of service not accessible from provided content.
Identity & Mission
Mission
Security-focused company; no explicit mission statement visible in provided content.
Editorial Code
No editorial code or policy statement visible in provided content.
Ownership
Private company (Truffle Security); ownership details not visible in provided content.
Access & Distribution
Access Model
Public blog post; no paywall or access restrictions indicated in provided HTML.
Ad/Tracking -0.05
Article 12
Google Analytics tracking enabled; minimal impact on privacy-related rights.
Accessibility
Font declarations present; semantic structure not fully visible in provided HTML.
-0.05
Article 12 Privacy
Medium Framing Practice
Structural
-0.05
Context Modifier
-0.05
SETL
+0.37

Domain uses Google Analytics tracking (per DCP), which collects user behavior data without explicit per-content consent, creating a minor structural tension with privacy protection principles. However, no paywall or access restrictions limit information flow.

ND
Preamble Preamble
Medium Framing

Not applicable at preamble level.

ND
Article 1 Freedom, Equality, Brotherhood
Low Framing

Not applicable.

ND
Article 2 Non-Discrimination
Low Framing

Not applicable.

ND
Article 3 Life, Liberty, Security
ND

Not applicable.

ND
Article 4 No Slavery
ND

Not applicable.

ND
Article 5 No Torture
ND

Not applicable.

ND
Article 6 Legal Personhood
ND

Not applicable.

ND
Article 7 Equality Before Law
ND

Not applicable.

ND
Article 8 Right to Remedy
ND

Not applicable.

ND
Article 9 No Arbitrary Detention
ND

Not applicable.

ND
Article 10 Fair Hearing
ND

Not applicable.

ND
Article 11 Presumption of Innocence
ND

Not applicable.

ND
Article 13 Freedom of Movement
Medium Framing

Not applicable.

ND
Article 14 Asylum
ND

Not applicable.

ND
Article 15 Nationality
ND

Not applicable.

ND
Article 16 Marriage & Family
ND

Not applicable.

ND
Article 17 Property
Medium Framing

Not applicable.

ND
Article 18 Freedom of Thought
Low Framing

Not applicable.

ND
Article 19 Freedom of Expression
High Advocacy Framing

Not applicable.

ND
Article 20 Assembly & Association
Medium Framing

Not applicable.

ND
Article 21 Political Participation
ND

Not applicable.

ND
Article 22 Social Security
ND

Not applicable.

ND
Article 23 Work & Equal Pay
ND

Not applicable.

ND
Article 24 Rest & Leisure
ND

Not applicable.

ND
Article 25 Standard of Living
ND

Not applicable.

ND
Article 26 Education
ND

Not applicable.

ND
Article 27 Cultural Participation
Medium Framing

Not applicable.

ND
Article 28 Social & International Order
ND

Not applicable.

ND
Article 29 Duties to Community
Low Framing

Not applicable.

ND
Article 30 No Destruction of Rights
ND

Not applicable.

Supplementary Signals
How this content communicates, beyond directional lean. Learn more
Epistemic Quality
How well-sourced and evidence-based is this content?
0.68 medium claims
Sources
0.7
Evidence
0.7
Uncertainty
0.6
Purpose
0.8
Propaganda Flags
No manipulative rhetoric detected
0 techniques detected
Emotional Tone
Emotional character: positive/negative, intensity, authority
measured
Valence
+0.1
Arousal
0.5
Dominance
0.6
Transparency
Does the content identify its author and disclose interests?
0.30
✗ Author
More signals: context, framing & audience
Solution Orientation
Does this content offer solutions or only describe problems?
0.59 mixed
Reader Agency
0.7
Stakeholder Voice
Whose perspectives are represented in this content?
0.35 2 perspectives
Speaks: institution
About: corporationindividualsgovernment
Temporal Framing
Is this content looking backward, at the present, or forward?
present immediate
Geographic Scope
What geographic area does this content cover?
global
Complexity
How accessible is this content to a general audience?
technical high jargon domain specific
Longitudinal 2712 HN snapshots · 11 evals
+1 0 −1 HN
Audit Trail 31 entries
2026-02-28 14:06 model_divergence Cross-model spread 0.27 exceeds threshold (4 models) - -
2026-02-28 14:06 eval_success Lite evaluated: Neutral (0.00) - -
2026-02-28 14:06 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral) 0.00
reasoning
Blog post on security
2026-02-28 14:02 eval_success Lite evaluated: Neutral (0.00) - -
2026-02-28 14:02 eval Evaluated by llama-3.3-70b-wai: 0.00 (Neutral)
reasoning
Blog post on security
2026-02-28 14:02 model_divergence Cross-model spread 0.27 exceeds threshold (4 models) - -
2026-02-26 23:18 eval_success Light evaluated: Mild positive (0.10) - -
2026-02-26 23:18 eval Evaluated by llama-4-scout-wai: +0.10 (Mild positive)
2026-02-26 20:26 dlq Dead-lettered after 1 attempts: Google API Keys Weren't Secrets. But Then Gemini Changed the Rules - -
2026-02-26 20:24 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 20:23 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 20:22 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 17:47 dlq Dead-lettered after 1 attempts: Google API Keys Weren't Secrets. But Then Gemini Changed the Rules - -
2026-02-26 17:45 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 17:44 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 17:43 rate_limit OpenRouter rate limited (429) model=llama-3.3-70b - -
2026-02-26 11:44 eval_success Evaluated: Mild positive (0.20) - -
2026-02-26 11:44 eval Evaluated by deepseek-v3.2: +0.20 (Mild positive) 16,988 tokens
2026-02-26 09:19 dlq Dead-lettered after 1 attempts: Google API Keys Weren't Secrets. But Then Gemini Changed the Rules - -
2026-02-26 09:19 dlq Dead-lettered after 1 attempts: Google API Keys Weren't Secrets. But Then Gemini Changed the Rules - -
2026-02-26 09:17 rate_limit OpenRouter rate limited (429) model=hermes-3-405b - -
2026-02-26 09:17 rate_limit OpenRouter rate limited (429) model=mistral-small-3.1 - -
2026-02-26 09:17 rate_limit OpenRouter rate limited (429) model=hermes-3-405b - -
2026-02-26 09:16 rate_limit OpenRouter rate limited (429) model=mistral-small-3.1 - -
2026-02-26 02:14 eval Evaluated by claude-haiku-4-5-20251001: +0.27 (Mild positive) 19,474 tokens +0.07
2026-02-26 02:14 eval Evaluated by claude-haiku-4-5-20251001: +0.20 (Mild positive) 18,476 tokens -0.13
2026-02-26 02:13 eval Evaluated by claude-haiku-4-5-20251001: +0.33 (Neutral) 19,091 tokens +0.13
2026-02-26 02:11 eval Evaluated by claude-haiku-4-5-20251001: +0.20 (Mild positive) 18,513 tokens -0.07
2026-02-26 02:10 eval Evaluated by claude-haiku-4-5-20251001: +0.27 (Mild positive) 18,577 tokens +0.17
2026-02-26 02:08 eval Evaluated by claude-haiku-4-5-20251001: +0.10 (Neutral) 20,004 tokens -0.17
2026-02-26 02:07 eval Evaluated by claude-haiku-4-5-20251001: +0.26 (Mild positive) 18,916 tokens