OpenAI rotates security certificates after supply chain attack hits development pipeline

April 14, 20262 min read1 sources
Share:
OpenAI rotates security certificates after supply chain attack hits development pipeline

OpenAI is rotating its macOS code-signing certificates after a malicious software package infiltrated one of its internal development workflows. The company confirmed the incident was discovered during a third-party security audit.

The attack leveraged a technique known as dependency confusion. A GitHub Actions workflow, used by OpenAI for building macOS applications, was tricked into executing a malicious package impersonating the popular 'axios' JavaScript library. These automated build environments often have access to sensitive credentials, and in this case, the workflow had access to the certificates used to sign and verify OpenAI's Mac software.

In a statement to BleepingComputer, OpenAI confirmed the breach was limited to an internal development environment. The company asserted that its core AI models, products, and customer data were not affected by the incident. By promptly rotating the potentially exposed certificates, OpenAI mitigates the risk of them being used by attackers to sign malicious applications and distribute them as legitimate software.

This event highlights the significant security challenges present in modern software development. Automated CI/CD (Continuous Integration/Continuous Deployment) pipelines are a primary target for attackers seeking to inject malicious code or steal credentials. The compromise of a code-signing certificate is a serious event, as it undermines the trust mechanisms that operating systems use to protect users from malware. While OpenAI contained this incident, it serves as a stark reminder of the persistent threat posed by software supply chain attacks.

Share:

// SOURCES

// RELATED

Adobe patches critical zero-day that was exploited for months

Adobe has patched a critical zero-day (CVE-2024-34097) in Acrobat and Reader that was actively exploited via malicious PDFs for at least four months.

2 min readApr 14

OpenAI issues Mac app update after developer tool hit by supply chain attack

OpenAI released a precautionary update for its macOS app after a developer tool used in its creation pulled a malicious version of a code library.

2 min readApr 14

Docker flaw lets attackers bypass authorization to gain host access

A high-severity flaw in Docker Engine, CVE-2026-34040, allows attackers to bypass security plugins and gain full access to host systems.

2 min readApr 13

AI-assisted campaign floods GitHub with over 300 malicious repositories

Researchers uncovered 'RepoStorm,' a campaign using AI to create hundreds of fake GitHub repositories that distribute info-stealing malware to develop

2 min readApr 13