Google has patched a critical vulnerability in its Gemini command-line interface (CLI) tool that could allow for remote code execution. The flaw, which had a CVSS score of 10.0, stemmed from the tool's automatic trust settings for workspace folders when running in headless mode. This fix may disrupt CI/CD pipelines and GitHub Actions that relied on the previous behavior, requiring users to update their workflows and explicitly trust folders. AI
Summary written by gemini-2.5-flash-lite from 2 sources. How we write summaries →
IMPACT Security patch for Gemini CLI may break CI/CD pipelines; users must update workflows and explicitly trust folders.
RANK_REASON A security patch for a specific product's command-line tool that may cause downstream issues for users.