Google Cloud services dominate leaked credentials across the Android ecosystemHundreds of Firebase databases show clear signs of automated compromiseExposed storage buckets leaked hundreds of millions of files

A major security investigation has analyzed 1.8 million Android apps available on the Google Play Store, focusing on those that explicitly claim AI features, and identified worrying security flaws which may be exposing secrets.

From the initial research pool, Cybernews researchers identified 38,630 Android AI apps and examined their internal code for exposed credentials and cloud service references, finding widespread data handling failures that extended far beyond isolated developer mistakes.

large language model API keys were relatively rare – only a small number of keys associated with major providers such as OpenAI, Google Gemini, and Claude were detected across the entire dataset.

In typical configurations, these leaked keys would allow attackers to submit new requests but would not provide access to stored conversations, historical prompts, or previous responses.

Some of the most severe exposures involved live payment infrastructure, including leaked Stripe secret keys capable of granting full control over payment systems.

Other leaked credentials enabled access to communication, analytics, and customer data platforms, allowing impersonation of apps or unauthorized data extraction.

These failures cannot be mitigated by basic tools like a firewall or malware removal tools after exposure has occurred.

The scale of exposed data and the number of already compromised apps suggest that app store screening alone has not reduced systemic risk.

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.