Axios Developer Tool Compromise: OpenAI Responds to Supply Chain Attack
Addressing the Axios Developer Tool Compromise: An Overview
OpenAI recently announced a security incident involving Axios, a widely utilized third-party developer tool, which was compromised as part of a broader industry-wide software supply chain attack. This incident, initially reported on March 31, 2026, by Google Cloud, highlighted a vulnerability where a malicious version of Axios (version 1.14.1) was inadvertently executed. For OpenAI, this occurred within a specific GitHub Actions workflow used for the macOS application-signing process.
Despite the potential exposure, OpenAI's thorough investigation has found no evidence that user data was accessed, internal systems or intellectual property were compromised, or that any of its software was altered. The company emphasized its commitment to transparency and swift action, immediately initiating a comprehensive response to mitigate any theoretical risks and inform its user base. This proactive approach underscores the critical importance of supply chain security in modern software development, especially for developer tools that are deeply integrated into production workflows.
OpenAI's Proactive Response and Enhanced Security Measures
In response to the Axios compromise, OpenAI has taken decisive steps to safeguard its macOS applications and user trust. The core of their strategy involves the rotation and revocation of security certificates used to sign their macOS apps. A GitHub Actions workflow, responsible for the macOS app-signing process, temporarily downloaded and executed the malicious Axios version. This workflow had access to critical certificate and notarization materials essential for verifying the authenticity of OpenAI's applications, such as ChatGPT Desktop, Codex App, Codex CLI, and Atlas.
While initial analysis suggests the signing certificate was likely not successfully exfiltrated by the malicious payload due to the timing and sequencing of events, OpenAI is treating the certificate as compromised out of an abundance of caution. This proactive stance means that all macOS users are now required to update their OpenAI applications to the latest versions. This measure is crucial for preventing any potential attempts by unauthorized entities to distribute fake applications that might appear to be legitimate OpenAI software, thereby upholding the integrity and security of their ecosystem.
Impacted macOS Applications and Required Updates
The security incident specifically targets OpenAI's macOS applications, necessitating immediate updates for users. The compromise of the Axios developer tool primarily affected the signing process for these desktop applications. Users of ChatGPT Desktop, Codex App, Codex CLI, and Atlas on macOS are urged to update their software to the latest versions. This ensures that their applications are signed with OpenAI's new, secure certificate, which is vital for maintaining the trust and security expected from official software.
Effective May 8, 2026, older versions of these macOS applications will cease to receive updates or support, and may become non-functional. This deadline is set to provide a sufficient window for users to transition to the new, securely signed versions. Below is a table detailing the applications affected and the minimum required versions that incorporate the updated certificate:
| Application | Minimum Updated Version |
|---|---|
| ChatGPT Desktop | 1.2026.051 |
| Codex App | 26.406.40811 |
| Codex CLI | 0.119.0 |
| Atlas | 1.2026.84.2 |
Users should only download updates through in-app notifications or via official download links provided directly by OpenAI. Avoid any links received through unsolicited emails, messages, or third-party websites, as these could be malicious attempts to exploit the situation.
Investigation, Remediation, and Supply Chain Security
OpenAI's response included a thorough investigation, enlisting a third-party digital forensics and incident response firm. Key remediation efforts involved rotating the macOS code signing certificate, publishing new builds of all affected macOS products with this new certificate, and collaborating with Apple to prevent any software signed with the previous certificate from being newly notarized. The company also diligently reviewed all notarizations made with the prior certificate, confirming no unexpected software notarization occurred, and validated that published software remained free from unauthorized modifications.
The root cause of this incident was identified as a misconfiguration in the GitHub Actions workflow, specifically the use of a floating tag for a dependency instead of a pinned, specific commit hash, and the lack of a configured minimumReleaseAge for new packages. This vulnerability in the GitHub Actions supply chain allowed the malicious Axios version to be executed. OpenAI has since addressed this misconfiguration, reinforcing their CI/CD pipeline security against similar supply chain attacks. This incident serves as a critical reminder for all developers to implement robust supply chain security practices, including careful dependency management and workflow configuration.
Ensuring User Trust and Data Protection
OpenAI's primary concern throughout this incident has been the security and privacy of user information. By promptly disclosing the issue and taking exhaustive measures, they aim to reinforce user trust. The company's commitment to transparency is evident in its detailed public statement and the provision of an extensive FAQ section to address user concerns directly. They confirmed that no user passwords or OpenAI API keys were affected, and the incident was isolated to the macOS app-signing process.
The phased approach to certificate revocation, with a 30-day window before May 8, 2026, also demonstrates a user-centric perspective. This grace period allows users to update their applications without immediate disruption, ensuring continuity of service while gradually phasing out the potentially compromised certificate. OpenAI continues to monitor for any indicators of misuse and has pledged to accelerate the revocation timeline if malicious activity is detected.
Key Takeaways for OpenAI macOS Users
For all users of OpenAI’s macOS applications, the most critical action is to update your software immediately. By doing so, you ensure your applications are signed with the new, secure certificate, protecting you from potential impersonation attacks and ensuring continued functionality post-May 8, 2026. Always obtain updates directly from official OpenAI channels—either through in-app prompts or their official website. Avoid third-party sources or suspicious links. While the incident posed a theoretical risk to the authenticity of macOS applications, OpenAI’s swift and comprehensive response has effectively contained the potential impact, allowing users to continue leveraging their innovative AI tools with confidence.
Original source
https://openai.com/index/axios-developer-tool-compromise/Frequently Asked Questions
Were OpenAI products or user data compromised?
Have you seen malware signed as OpenAI?
Do I need to change my password?
Does this affect iOS, Android, Linux, or Windows?
Why are you asking me to update my Mac apps?
What happens after May 8, 2026?
Why are you not revoking the certificate immediately?
Stay Updated
Get the latest AI news delivered to your inbox.
