Last Updated on September 4, 2025 by Editorial Team Author(s): Harsh Chandekar Originally published on Towards AI. Imagine uploading a cute cat photo to Google’s Gemini AI for a quick analysis, only to have it secretly whisper instructions to steal your Google data. Sounds like a plot from a sci-fi thriller, right? Well, it’s not fiction — it’s a real vulnerability in Gemini’s image processing. In this post, we’ll dive into how hackers are embedding invisible commands in images, t...