Story Details

  • We hacked Gemini's Python sandbox and leaked its source code (at least some)

    Posted: 2025-03-28 18:12:58

    Security researchers exploited a vulnerability in Gemini's sandboxed Python execution environment, allowing them to access and leak parts of Gemini's source code. They achieved this by manipulating how Python's pickle module interacts with the restricted environment, effectively bypassing the intended security measures. While claiming no malicious intent and having reported the vulnerability responsibly, the researchers demonstrated the potential for unauthorized access to sensitive information within Gemini's system. The leaked code included portions related to data retrieval and formatting, but the full extent of the exposed code and its potential impact on Gemini's security are not fully detailed.

    Summary of Comments ( 120 )
    https://news.ycombinator.com/item?id=43508418

    Hacker News users discussed the Gemini hack and subsequent source code leak, focusing on the sandbox escape vulnerability exploited. Several questioned the practicality and security implications of running untrusted Python code within Gemini, especially given the availability of more secure and robust sandboxing solutions. Some highlighted the inherent difficulties in completely sandboxing Python, while others pointed out the existence of existing tools and libraries, like gVisor, designed for such tasks. A few users found the technical details of the exploit interesting, while others expressed concern about the potential impact on Gemini's development and future. The overall sentiment was one of cautious skepticism towards Gemini's approach to code execution security.