Skip to main content

Community Contest: Create and Share Your Security Gemini Gems

  • March 12, 2026
  • 0 replies
  • 25 views

chuvakin
Staff
Forum|alt.badge.img+9

Create and Share Your Security Gemini Gems

 

We're launching a new Community challenge, and this time you not only have a chance to win Google swag, but to also be featured on the Google Cloud Security podcast with  Anton Chuvakin and Timothy Peacock. The goal is simple: create and share a Gemini Gem that streamlines security tasks and saves you time.

 

How to Participate:

We are looking for creativity and utility.

1. Design a Gemini Gem that solves a specific security problem. Crucially, DO NOT put corporate sensitive data in your Gems!

 

2. Share your submission in the comments below and include the following:

  •     A link to your Gem. Learn about sharing Gems here.
  •     Who it is for (e.g., SOC analyst, CISO, Compliance Manager).
  •     A clear explanation of how to use it and the the value you derive from it (saves time, reduces risk, makes tasks easy, etc)

 

3. Determining the winner:

  • The post with the most likes in the comment section below will win. Make sure to like your favorite responses to help us find our winners!
  • Separate from the most liked post, a panel of Googlers will determine at least one additional winner based on Gem creativity and utility.

 

Prizes:

The post with the highest number of likes will receive multiple Google Cloud Security swag items, and Anton and Tim will consider inviting them to speak on the Google Cloud Security podcast! Additional Google Cloud Security swag will be given out to participants who are either chosen by the Googler panel, or receive the second and third highest number of post likes.

 

Duration:

The challenge will run from March 12th - April 9th, 2026. 

 

Winner Announcement Date:

Winners will be announced shortly after the challenge closes.

 

Gem Ideas and Use Cases

Security Gems can be role-based, focusing on areas like CISO gems or policy/compliance Gems. Need a place to start? Here are some ideas from our team:

 

Target Audience

Idea/Use Case

Functionality

Vulnerability Management

CVE Explainer/Prioritizer

Summarize, explain, and prioritize new vulnerabilities from advisories. A Gem could fetch structured data about a Common Vulnerability and Exposure (CVE), including impact and suggested workarounds.

Threat Intelligence

The Threat Intel Synthesizer

Quickly distill vast amounts of threat intelligence into actionable, prioritized insight, extracting top IOCs and summarizing TTPs.

DevSecOps/Code Review

The Code/Configuration Auditor

Act as a Secure Code Reviewer to identify basic security misconfigurations, such as hardcoded secrets or overly permissive access controls, and suggest secure alternatives.

Compliance/GRC

The Policy Compliance Checker

Rapidly check if a new operational proposal conflicts with existing internal policies, or generate ideas for PCI DSS / compliance compensating controls and mitigations.

Security Awareness

The Security Awareness Content Generator

Convert complex, technical vulnerabilities into engaging, non-technical communications like a short chat message or an executive summary.

 

 

We are looking for creativity, clarity, and most importantly, how the Gem improves your security workflow. Don't hold back—even small, clever use cases can make a big impact.

 

Ready to share? Drop your submission below in the comment section!