top of page

OpenAI Rotates Signing Certificates After npm Supply Chain Attack Exposes Internal Credentials

  • 28 minutes ago
  • 4 min read

OpenAI has disclosed that attackers tied to the ongoing TanStack npm supply chain compromise gained access to internal credentials after breaching two employee devices, underscoring how deeply modern software attacks can penetrate development environments without ever touching production systems.


The company said the intrusion was part of the broader “Mini Shai-Hulud” campaign, a fast-moving operation targeting npm ecosystems, CI/CD pipelines, and developer tooling. While OpenAI emphasized that no customer data or production infrastructure was impacted, the breach was significant enough to trigger a sweeping credential reset and certificate rotation across several desktop products.


Affected applications include ChatGPT Desktop for macOS, Codex App, Codex CLI, and Atlas. Users have been instructed to update their software before a mid-June deadline as new signing certificates are rolled out.


A Breach That Started at the Developer Edge


According to OpenAI, the attackers gained a foothold through compromised open source dependencies that had not yet been blocked by newly deployed supply chain protections. The two affected employee machines were outside the latest enforcement layer, creating a narrow but critical window of exposure.


From there, attackers conducted what OpenAI described as “credential-focused exfiltration activity,” targeting internal repositories accessible from those endpoints. Only a limited set of credentials was taken, but even that proved enough to warrant a defensive reset across multiple systems.


The incident highlights a growing reality in cybersecurity. The weakest point is no longer the production environment but the developer workstation and the software assembly line surrounding it.


The Expanding Blast Radius of npm Supply Chain Attacks


The compromise is linked to a broader campaign that has been quietly spreading through widely used JavaScript ecosystems. Security researchers have tied the activity to a group known as TeamPCP, which has focused on poisoning trusted open source packages and harvesting developer credentials at scale.


In the TanStack case, attackers reportedly injected dozens of malicious package versions into the ecosystem after compromising parts of the project’s release infrastructure. These packages were engineered to extract sensitive tokens, including GitHub credentials, cloud secrets, and CI/CD authentication data.


What makes the campaign particularly dangerous is how it abuses legitimate trust mechanisms. Malicious packages were distributed through verified pipelines, meaning they appeared authentic to standard security checks.


When Trust Becomes the Vulnerability


Gene Moody, Field CTO at Action1, said the root issue is structural.


“Supply chain attacks keep working because the industry spent the last twenty years optimizing frictionless code movement, not controlled execution,” Moody explained. “A single NPM install can introduce hundreds of packages, many maintained by individuals with no operational security model. Once that decision resolves, the code executes inside trusted environments, often with access to tokens, build secrets, and signing keys. Not as an edge case, that is the default behavior.”


Moody pointed to the decentralization of execution authority as a major risk factor, where developers can introduce new dependencies with little oversight.


“The root problem is that execution trust is granted too early, too broadly, too graciously, and too invisibly,” he said. “Until organizations reintroduce friction, validation, and centralized control over what runs and when, these attacks will continue to scale.”


Authentic But Malicious


Mayank Kumar, Founding AI Engineer at DeepTempo, said the attack exposes a critical flaw in how organizations think about software trust.


“This is the clearest signal yet that the supply chain’s trust primitives, like code signing, provenance attestation, and SLSA build levels, are authentication mechanisms not security ones,” Kumar said. “The attackers didn’t forge anything. They hijacked a legitimate CI/CD pipeline and trusted npm’s signing infrastructure to produce cryptographically valid SLSA attestation for malicious packages.”


Kumar emphasized that traditional verification methods are blind to behavior.

“Provenance tells you where a package came from. It tells you nothing about what it does,” he said. “Signatures attest to origin. Network behavior is what reveals intent.”


A Playbook for the Next Wave of Attacks


Chris DeBrunner, CISO at CBTS, said the OpenAI incident is less about failure and more about methodology.


“The more important story is how well the attack was constructed,” DeBrunner said. “They chained workflow misconfigurations, exploited pipeline logic, and extracted tokens in memory to hijack a trusted release process. A dependency scanner checking package provenance probably would have flagged nothing.”


He added that the campaign reflects a broader shift in attacker strategy.


“One compromised package reaches millions of developers,” DeBrunner said. “Attackers have shifted toward shared infrastructure because the leverage is significant.”


The New Reality of Software Supply Chain Security


OpenAI’s response, isolating affected devices, rotating credentials, and auditing pipeline access, aligns with best practices. But the incident reinforces a larger trend. Attackers are moving upstream, targeting the systems that build and distribute software rather than the software itself.


The takeaway for security leaders is increasingly clear. Trust signals like signatures and provenance are necessary but no longer sufficient. Visibility into runtime behavior, tighter control over developer environments, and stricter governance of dependencies are becoming mandatory.


For now, OpenAI says it continues to monitor for any downstream misuse of the stolen credentials. But the broader campaign shows no signs of slowing.


The software supply chain has become the new front line, and attackers are already several steps ahead.

bottom of page