Code Velocity
AI Security

Axios Developer Tool Compromise: OpenAI Responds to Supply Chain Attack

·11 min read·OpenAI·Original source
Share
OpenAI's response to the Axios developer tool compromise, highlighting macOS app security updates.

Axios Developer Tool Compromise: OpenAI Responds to Supply Chain Attack

Addressing the Axios Developer Tool Compromise: An Overview

OpenAI recently announced a security incident involving Axios, a widely utilized third-party developer tool, which was compromised as part of a broader industry-wide software supply chain attack. This incident, initially reported on March 31, 2026, by Google Cloud, highlighted a vulnerability where a malicious version of Axios (version 1.14.1) was inadvertently executed. For OpenAI, this occurred within a specific GitHub Actions workflow used for the macOS application-signing process.

Despite the potential exposure, OpenAI's thorough investigation has found no evidence that user data was accessed, internal systems or intellectual property were compromised, or that any of its software was altered. The company emphasized its commitment to transparency and swift action, immediately initiating a comprehensive response to mitigate any theoretical risks and inform its user base. This proactive approach underscores the critical importance of supply chain security in modern software development, especially for developer tools that are deeply integrated into production workflows.

OpenAI's Proactive Response and Enhanced Security Measures

In response to the Axios compromise, OpenAI has taken decisive steps to safeguard its macOS applications and user trust. The core of their strategy involves the rotation and revocation of security certificates used to sign their macOS apps. A GitHub Actions workflow, responsible for the macOS app-signing process, temporarily downloaded and executed the malicious Axios version. This workflow had access to critical certificate and notarization materials essential for verifying the authenticity of OpenAI's applications, such as ChatGPT Desktop, Codex App, Codex CLI, and Atlas.

While initial analysis suggests the signing certificate was likely not successfully exfiltrated by the malicious payload due to the timing and sequencing of events, OpenAI is treating the certificate as compromised out of an abundance of caution. This proactive stance means that all macOS users are now required to update their OpenAI applications to the latest versions. This measure is crucial for preventing any potential attempts by unauthorized entities to distribute fake applications that might appear to be legitimate OpenAI software, thereby upholding the integrity and security of their ecosystem.

Impacted macOS Applications and Required Updates

The security incident specifically targets OpenAI's macOS applications, necessitating immediate updates for users. The compromise of the Axios developer tool primarily affected the signing process for these desktop applications. Users of ChatGPT Desktop, Codex App, Codex CLI, and Atlas on macOS are urged to update their software to the latest versions. This ensures that their applications are signed with OpenAI's new, secure certificate, which is vital for maintaining the trust and security expected from official software.

Effective May 8, 2026, older versions of these macOS applications will cease to receive updates or support, and may become non-functional. This deadline is set to provide a sufficient window for users to transition to the new, securely signed versions. Below is a table detailing the applications affected and the minimum required versions that incorporate the updated certificate:

ApplicationMinimum Updated Version
ChatGPT Desktop1.2026.051
Codex App26.406.40811
Codex CLI0.119.0
Atlas1.2026.84.2

Users should only download updates through in-app notifications or via official download links provided directly by OpenAI. Avoid any links received through unsolicited emails, messages, or third-party websites, as these could be malicious attempts to exploit the situation.

Investigation, Remediation, and Supply Chain Security

OpenAI's response included a thorough investigation, enlisting a third-party digital forensics and incident response firm. Key remediation efforts involved rotating the macOS code signing certificate, publishing new builds of all affected macOS products with this new certificate, and collaborating with Apple to prevent any software signed with the previous certificate from being newly notarized. The company also diligently reviewed all notarizations made with the prior certificate, confirming no unexpected software notarization occurred, and validated that published software remained free from unauthorized modifications.

The root cause of this incident was identified as a misconfiguration in the GitHub Actions workflow, specifically the use of a floating tag for a dependency instead of a pinned, specific commit hash, and the lack of a configured minimumReleaseAge for new packages. This vulnerability in the GitHub Actions supply chain allowed the malicious Axios version to be executed. OpenAI has since addressed this misconfiguration, reinforcing their CI/CD pipeline security against similar supply chain attacks. This incident serves as a critical reminder for all developers to implement robust supply chain security practices, including careful dependency management and workflow configuration.

Ensuring User Trust and Data Protection

OpenAI's primary concern throughout this incident has been the security and privacy of user information. By promptly disclosing the issue and taking exhaustive measures, they aim to reinforce user trust. The company's commitment to transparency is evident in its detailed public statement and the provision of an extensive FAQ section to address user concerns directly. They confirmed that no user passwords or OpenAI API keys were affected, and the incident was isolated to the macOS app-signing process.

The phased approach to certificate revocation, with a 30-day window before May 8, 2026, also demonstrates a user-centric perspective. This grace period allows users to update their applications without immediate disruption, ensuring continuity of service while gradually phasing out the potentially compromised certificate. OpenAI continues to monitor for any indicators of misuse and has pledged to accelerate the revocation timeline if malicious activity is detected.

Key Takeaways for OpenAI macOS Users

For all users of OpenAI’s macOS applications, the most critical action is to update your software immediately. By doing so, you ensure your applications are signed with the new, secure certificate, protecting you from potential impersonation attacks and ensuring continued functionality post-May 8, 2026. Always obtain updates directly from official OpenAI channels—either through in-app prompts or their official website. Avoid third-party sources or suspicious links. While the incident posed a theoretical risk to the authenticity of macOS applications, OpenAI’s swift and comprehensive response has effectively contained the potential impact, allowing users to continue leveraging their innovative AI tools with confidence.

Frequently Asked Questions

Were OpenAI products or user data compromised?
No. OpenAI's thorough investigation into the Axios developer tool compromise found no evidence that any OpenAI products were compromised or that user data was accessed or exposed. The company confirmed that its systems and intellectual property remained uncompromised, and its software was not altered. This incident was primarily a supply chain attack on a third-party library, and OpenAI acted out of an abundance of caution to protect its macOS applications, despite no direct impact on user information or core systems. This proactive measure ensures the continued integrity of their platform and the privacy of their users, even in the face of theoretical risks.
Have you seen malware signed as OpenAI?
OpenAI has confirmed that, as of their investigation, there is no evidence that the potentially exposed notarization and code signing materials have been misused to sign malicious software appearing as legitimate OpenAI applications. All notarization events associated with the impacted materials were reviewed and confirmed to be legitimate. While the risk of such misuse was the primary reason for their proactive response, continuous monitoring is in place to detect any unauthorized activity. Users are encouraged to remain vigilant and only download applications from official sources.
Do I need to change my password?
No, there is no need for users to change their passwords or OpenAI API keys. The security incident involving the Axios developer tool compromise did not impact user credentials or API keys. OpenAI's internal systems holding such sensitive information were not breached, and the nature of the compromise was isolated to the app-signing process for macOS applications. Users can be confident that their account security remains intact and no action is required on their part regarding credentials.
Does this affect iOS, Android, Linux, or Windows?
No, this security incident specifically affects only OpenAI's macOS applications, including ChatGPT Desktop, Codex App, Codex CLI, and Atlas. The compromise was tied to a GitHub Actions workflow used exclusively for the macOS app-signing process. Users on iOS, Android, Linux, or Windows platforms, including those accessing OpenAI services via web browsers, are not affected by this particular incident and do not need to take any action related to this advisory. The vulnerability was platform-specific due to the nature of the signing certificate's exposure.
Why are you asking me to update my Mac apps?
OpenAI is proactively requesting macOS users to update their applications due to an identified exposure within a GitHub Actions workflow that was part of the macOS app-signing process. Although there's no evidence of misuse, OpenAI is rotating its notarization and code signing certificates out of caution. Updating your Mac apps ensures they are signed with the new, secure certificate, which verifies that the software genuinely originates from OpenAI and has not been tampered with, thereby safeguarding against potential future impersonation attempts and ensuring the integrity of your installed applications.
What happens after May 8, 2026?
After May 8, 2026, older versions of OpenAI's macOS desktop applications—specifically ChatGPT Desktop (earlier than 1.2026.051), Codex App (earlier than 26.406.40811), Codex CLI (earlier than 0.119.0), and Atlas (earlier than 1.2026.84.2)—will no longer receive updates or official support. More critically, these older versions may cease to function entirely, as macOS security protections will begin to block downloads and launches of apps signed with the revoked certificate. Users are strongly advised to update before this date to maintain full functionality and security and avoid any service interruptions.
Why are you not revoking the certificate immediately?
OpenAI has chosen a phased approach to certificate revocation, implementing a 30-day window before full revocation on May 8, 2026. This decision was made to minimize disruption for users. While new notarizations with the previous certificate have already been blocked, immediate full revocation would cause macOS to block downloads and first-time launches of existing apps signed with that certificate. The grace period allows users to update their applications smoothly through built-in mechanisms, ensuring continuity of service while still mitigating risk. OpenAI is actively monitoring for misuse and is prepared to accelerate revocation if necessary.

Stay Updated

Get the latest AI news delivered to your inbox.

Share