Cloud Security

Google API Keys Persist After Deletion

Your supposedly deleted Google API keys might still be working. A critical vulnerability leaves sensitive credentials accessible for nearly half an hour after removal.

Illustration of a digital lock with a clock showing a 23-minute delay before it fully closes.

Key Takeaways

  • Google API keys remain active for 23 minutes after deletion, contradicting immediate revocation claims.
  • This vulnerability allows unauthorized access to services for a significant time post-deletion.
  • The issue stems from inherent delays in distributed systems, not necessarily a simple bug.
  • Developers must account for this residual access window in their security workflows.

For anyone building on Google Cloud, or frankly, any major cloud platform, the promise of immediate revocation is foundational. It’s the digital equivalent of slamming the door shut, the final act of securing a system. So when a security researcher, going by the handle ‘Gaf’, discovered that Google API keys can remain active for a startling 23 minutes after deletion, it’s not just a technical hiccup. It’s a systemic worry. Imagine: you’ve just decommissioned a service, wiped its access, thought you were safe, and for almost half an hour, a digital skeleton key is still rattling around, potentially in the wrong hands.

This isn’t about a few misplaced characters in a firewall rule. This is about the very mechanisms that grant access to vast troves of data and processing power. The implications for real people are stark. Think of developers who, under pressure or through error, might prematurely delete a key tied to sensitive customer data. Or think of a company undergoing a rapid security incident response, frantically revoking credentials only to find a residual window of vulnerability. For those 23 minutes, that key is a ticking time bomb, a digital ghost that can still open doors.

The core of the issue lies, as Gaf meticulously documented, in the underlying architecture of Google’s authentication and authorization systems. It’s not as simple as flipping a switch. Deletion isn’t an atomic operation across distributed systems. There are caches, replication delays, and propagation times. Google’s claim of immediate deletion, while perhaps technically true in a distributed eventual consistency model (meaning it will be deleted everywhere eventually), fails to account for the practical security implications of that interim period. The system is designed for speed and scale, but security often requires a more deliberate, absolute finality.

This persistence, even for a short duration, exposes a fundamental tension in modern cloud infrastructure: the trade-off between instantaneity and absolute control. When you delete an API key, you’re not just deleting a string of text; you’re telling a complex, globally distributed network of servers to stop trusting that identifier. And apparently, that message, while eventually delivered, doesn’t arrive at every doorstep simultaneously. The delay creates a critical gap.

Why Does This Matter for Developers?

For developers, this is more than just an academic curiosity. It’s a practical nightmare waiting to happen. Gaf’s findings, shared on Twitter and subsequently detailed in blog posts, highlight how these lingering keys can still be used to interact with Google Cloud services. This means unauthorized access to storage buckets, databases, compute instances — anything that API key was permitted to touch.

“The keys can still be used to authenticate and authorize API calls for the duration of the TTL (Time To Live), which is 23 minutes.”

This quote, from Gaf’s analysis, cuts to the heart of the problem. It’s not that the key exists; it’s that it’s valid. The system is still issuing ‘trust’ based on a credential that should, by all accounts, be defunct. This isn’t a bug in the sense of something being broken; it’s a feature of distributed systems that has a serious security downside. It means developers can’t rely on the naive assumption that delete means gone and unusable immediately.

It forces a re-evaluation of deletion workflows. Are developers building applications that require an absolute, instantaneous revocation? If so, they might need to implement additional client-side or application-level checks, effectively creating their own layer of denial for recently deleted keys. This adds complexity and potential points of failure to systems that are already incredibly complex. It’s a form of ‘defense in depth’ where you’re shoring up a weakness provided by the cloud provider itself.

This vulnerability is a stark reminder that cloud security is a shared responsibility, but it also highlights how architectural choices, driven by performance, can have unintended security consequences. Google’s response, to its credit, has been to acknowledge the report and state they are investigating. However, the technical reality of distributed systems means that ‘immediate’ is a fluid concept, and for security, it often needs to be a hard, uncompromising one.

Is This a Google-Specific Problem?

Probably not. While Gaf’s spotlight is on Google, the underlying challenge is inherent in any large-scale, distributed system. Amazon Web Services, Microsoft Azure, and other major cloud providers face similar architectural hurdles. The way credentials are cached, propagated, and validated across thousands of servers globally means that there’s almost always some degree of eventual consistency. The critical difference is how this is managed and communicated to users.

For years, the security community has operated under the implicit assumption that when you delete a credential, it’s dead. Gaf’s work has brought this implicit assumption into sharp, uncomfortable focus. It’s a historical parallel to early days of SSL certificates, where trust was assumed but validation mechanisms were still maturing. The difference here is that API keys are often more granular and directly tied to operational access, making their persistence potentially more damaging.

The key takeaway isn’t that Google is uniquely insecure; it’s that the very nature of distributed computing introduces these temporal blind spots. Companies need to be transparent about these delays, and users need to be aware that ‘deleted’ may not mean ‘unusable’ for a brief, but significant, period. This discovery will undoubtedly spur further research into how other providers handle credential revocation and prompt a re-evaluation of best practices for sensitive key management.

**


🧬 Related Insights

Frequently Asked Questions**

What does this vulnerability mean for my Google Cloud project? It means that if you delete an API key, it could still be used for up to 23 minutes afterward. This is a concern if that key granted access to sensitive data or resources.

How can I protect myself from this? While Google investigates, consider implementing additional application-level checks to deny access for keys recently flagged for deletion. Also, always adhere to the principle of least privilege for all API keys.

Will other cloud providers have this issue too? This type of credential persistence is a common challenge in distributed systems. While the exact duration may vary, other cloud providers likely face similar architectural realities.

Written by
Threat Digest Editorial Team

Curated insights, explainers, and analysis from the editorial team.

Frequently asked questions

What does this vulnerability mean for my Google Cloud project?
It means that if you delete an API key, it could still be used for up to 23 minutes afterward. This is a concern if that key granted access to sensitive data or resources.
How can I protect myself from this?
While Google investigates, consider implementing additional application-level checks to deny access for keys recently flagged for deletion. Also, always adhere to the principle of least privilege for all API keys.
Will other cloud providers have this issue too?
This type of credential persistence is a common challenge in distributed systems. While the exact duration may vary, other cloud providers likely face similar architectural realities.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Dark Reading

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.