OpenAI is rotating its macOS code-signing certificates after a malicious software package infiltrated one of its internal development workflows. The company confirmed the incident was discovered during a third-party security audit.
The attack leveraged a technique known as dependency confusion. A GitHub Actions workflow, used by OpenAI for building macOS applications, was tricked into executing a malicious package impersonating the popular 'axios' JavaScript library. These automated build environments often have access to sensitive credentials, and in this case, the workflow had access to the certificates used to sign and verify OpenAI's Mac software.
In a statement to BleepingComputer, OpenAI confirmed the breach was limited to an internal development environment. The company asserted that its core AI models, products, and customer data were not affected by the incident. By promptly rotating the potentially exposed certificates, OpenAI mitigates the risk of them being used by attackers to sign malicious applications and distribute them as legitimate software.
This event highlights the significant security challenges present in modern software development. Automated CI/CD (Continuous Integration/Continuous Deployment) pipelines are a primary target for attackers seeking to inject malicious code or steal credentials. The compromise of a code-signing certificate is a serious event, as it undermines the trust mechanisms that operating systems use to protect users from malware. While OpenAI contained this incident, it serves as a stark reminder of the persistent threat posed by software supply chain attacks.




