Vercel breach traced to AI tool after employee grants unrestricted Google Workspace access

5 Sources

Share

Vercel, the cloud platform behind Next.js, disclosed a security breach originating from Context.ai, a third-party AI tool. A Vercel employee granted the AI tool unrestricted OAuth permissions to their corporate Google Workspace account. When Context.ai was compromised through infostealer malware, attackers inherited those permissions and accessed Vercel's internal systems, exposing non-sensitive environment variables for a limited subset of customers.

Vercel Breach Exposes Critical OAuth Security Gaps

Vercel, the cloud platform powering the widely used Next.js web framework, confirmed a security incident on April 19 that resulted in unauthorized access to internal systems and compromised customer credentials for a limited subset of users

1

. The Vercel breach didn't originate within the company's own infrastructure but through Context.ai, a third-party AI tool that builds agents trained on company-specific knowledge

2

. At least one Vercel employee had signed up for Context.ai's AI Office Suite using their corporate account and granted it "Allow All" OAuth permissions, creating an expansive attack surface

1

.

Source: SiliconANGLE

Source: SiliconANGLE

How Employee Grants Unrestricted Access Created Entry Point

The employee grants unrestricted access decision proved catastrophic when attackers compromised Context.ai and inherited those broad permissions. This unauthorized access to Google Workspace allowed the threat actor to take over the employee's Vercel Google Workspace account and move laterally into internal systems

1

. Context.ai acknowledged in its security bulletin that "Vercel's internal OAuth configurations appear to have allowed this action to grant these broad permissions in Vercel's enterprise Google Workspace"

2

. The OAuth token compromise enabled attackers to escalate privileges by accessing non-sensitive environment variables that weren't encrypted with Vercel's sensitive designation feature

3

.

Infostealer Malware Infection Traced to Roblox Cheat Download

Cybersecurity firm Hudson Rock traced the third-party AI tool compromise back to an infostealer malware infection on a Context.ai employee's machine in February 2026

1

. According to Hudson Rock's forensic analysis, the employee downloaded Roblox auto-farm scripts and game exploit executors, which delivered Lumma Stealer malware

3

. The harvested credentials included Google Workspace logins, Supabase keys, Datadog tokens, Authkit credentials, and the [email protected] account

3

. Context.ai detected unauthorized access to its AWS environment in March and hired CrowdStrike to investigate, but later learned the attacker had also compromised OAuth tokens for consumer users

1

.

Source: Tom's Hardware

Source: Tom's Hardware

Compromised Customer Credentials and Response Measures

The breach exposed compromised customer credentials stored as non-sensitive environment variables, though Vercel emphasized that variables marked as "sensitive" remain encrypted at rest and were not accessed

1

. CEO Guillermo Rauch described the attacker as "highly sophisticated and, I strongly suspect, significantly accelerated by AI," noting they "moved with surprising velocity and in-depth understanding of Vercel"

4

. A threat actor using the ShinyHunters name claimed responsibility and reportedly sought $2 million for the stolen data, though Google Threat Intelligence assessed the claimant as "likely an imposter"

3

. Vercel has engaged Mandiant, Google's incident response firm, notified law enforcement, and contacted affected customers directly

1

.

Security Risks from Third-Party Integrations Amplified

This incident highlights escalating security risks from third-party integrations, particularly as agentic AI products link to external services. "Because many crypto frontends use Vercel to host their UI, a breach can allow attackers to implant a wallet drainer," explained Natalie Newson, CertiK senior blockchain security researcher

4

. The dwell time raises particular concern—nearly a month separated Context.ai's March detection from Vercel's Sunday disclosure, while a separate Trend Micro analysis references an intrusion potentially beginning as early as June 2024

3

. John Woods, CEO of Nillion, recommended companies "lock down OAuth grants, use least privilege, enforce strict controls around sensitive environment variables, separate frontend deployment from secret or signing authority, and monitor deployments and logs closely"

4

.

Source: VentureBeat

Source: VentureBeat

Supply Chain Vulnerabilities and Developer Tooling at Risk

Vercel, which received a $9.3 billion valuation last year, provides developer tooling that helps build web applications and operates cloud infrastructure for hosting them

5

. The stolen data reportedly included information about hundreds of employees and API keys associated with GitHub repositories

5

. Access to these repositories could enable supply chain vulnerabilities with potential to compromise numerous developers. However, Rauch confirmed that Next.js, Turbopack, AI SDK, and all Vercel-published npm packages remain uncompromised after a coordinated audit with GitHub, Microsoft, npm, and Socket

3

. Vercel now defaults environment variable creation to "sensitive" and has deployed new dashboard features for managing variable settings

3

. The company advises customers to audit activity logs, rotate API keys and tokens stored in non-sensitive environment variables, and implement credential rotation immediately

2

.

Today's Top Stories

TheOutpost.ai

Your Daily Dose of Curated AI News

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

© 2026 Triveous Technologies Private Limited
Instagram logo
LinkedIn logo