{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreifn4zizre2hqd4jv6mepmds2oswr7sgb4inqegfjgwb3toaayhpm4",
"uri": "at://did:plc:xb5etev7ncohgebas3kjeqek/app.bsky.feed.post/3mla4nfxoh2e2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreidmisd4vwsln3a4a2o5eteamymodnzzu7quwofe44lvgumic4o67q"
},
"mimeType": "image/jpeg",
"size": 22425
},
"path": "/google-cvss-10-gemini-cli-vulnerability-github-rce/",
"publishedAt": "2026-05-06T20:02:52.000Z",
"site": "https://hackread.com",
"tags": [
"Security",
"Artificial Intelligence",
"Google",
"Cybersecurity",
"Gemini CLI",
"GitHub",
"Pillar Security",
"RCE",
"Technology",
"Vulnerability"
],
"textContent": "Google patches a CVSS 10 Gemini CLI vulnerability that allowed hackers to use prompt injection and privilege escalation for a full supply chain compromise.",
"title": "Google Fixes CVSS 10 Gemini CLI Vulnerability Enabling GitHub Issue-Based RCE"
}