AI Promptware Hack Triggers Real-World Smart Home Control

A recent study by researchers at Tel Aviv University has exposed a severe vulnerability in Google’s Gemini AI system, which can be exploited to control smart home devices. The team discovered that malicious actors could inject instructions into Gemini through calendar appointments, allowing them to manipulate the AI’s behavior and trigger smart home actions.

Gemini, connected to the broader Google ecosystem, offers users access to their calendar, assistant smart home devices, messaging, and more. This makes it an attractive target for hackers seeking to cause chaos or steal data. The researchers employed a technique called indirect prompt injection attack, where malicious instructions are fed to Gemini through another user.

The exploit begins with a poisoned calendar event that contains malicious commands. When the user asks Gemini to summarize their schedule, the AI processes the tainted event, executing the instructions. A sample prompt demonstrating this tactic shows how the hackers would instruct Gemini to activate smart home devices when specific keywords are typed.

This attack successfully evaded Google’s existing safeguards and demonstrated the ability to control various smart home devices, including lights, thermostats, and blinds. The study suggests that promptware attacks may be entering the real world, marking a significant concern for AI safety.

Source: https://arstechnica.com/google/2025/08/researchers-use-calendar-events-to-hack-gemini-control-smart-home-gadgets