Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

675+ Articles
119+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident
OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident
NEWS

OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident

OpenAI has revoked the signing certificate for its macOS applications after discovering a GitHub Actions workflow inadvertently downloaded the compromised Axios npm package on March 31. The company says no user data or internal systems were affected.

Dylan H.

News Desk

April 13, 2026
3 min read

OpenAI has revoked the code-signing certificate used to distribute its macOS desktop applications after the company's CI/CD pipeline inadvertently pulled in the trojanized version of the axios npm package during the March 31 supply chain attack.

What Happened

On March 31, 2026, threat actors compromised the npm account of an Axios maintainer and published a malicious version of the widely-used HTTP library. The tampered package contained credential-stealing code that targeted CI/CD environments — a well-documented tactic used in this campaign.

OpenAI disclosed that a GitHub Actions workflow responsible for signing its macOS applications executed during the attack window and downloaded the malicious Axios library as part of the build process.

"Out of an abundance of caution, we are taking steps to protect the process that certifies our macOS applications," OpenAI said in a statement. "We are revoking our existing macOS app certificate and will re-sign our applications."

Scope of the Incident

OpenAI emphasized that the impact was limited:

  • No user data was compromised
  • No internal systems were accessed
  • The certificate revocation is a precautionary measure given the build environment's exposure

The malicious Axios version was designed to exfiltrate CI/CD secrets, tokens, and credentials from pipelines that installed it. While OpenAI states no material damage occurred, the certificate revocation reflects that the signing keys may have been exposed to the compromised runtime environment.

The Axios Supply Chain Attack

The broader Axios npm attack — attributed by Google's Threat Intelligence Group (GTIG) to North Korean hackers tracked as UNC1069 — targeted the official axios npm package maintainer via social engineering. The group posed as a recruiter and used a fake Microsoft Teams error message to trick the maintainer into executing a malicious payload that granted the attackers access to the npm publishing account.

The compromised package was downloaded by thousands of projects before detection. Major organizations, including OpenAI, Mercor, and others, confirmed their build pipelines were affected to varying degrees.

Certificate Revocation Impact

macOS users with older versions of OpenAI desktop applications (such as the ChatGPT app) may encounter security warnings or functionality issues until they update to a re-signed release. Apple's Gatekeeper system will flag binaries signed with revoked certificates.

OpenAI has stated it will re-sign all macOS applications with a new certificate and push updates through standard distribution channels.

Recommendations for Organizations

This incident highlights how a single compromised npm package can cascade through build pipelines at major organizations. Security teams should:

  1. Audit CI/CD dependency logs from March 28 – April 2, 2026 for the malicious Axios versions (1.7.8 through 1.7.10 or modified versions around that period)
  2. Rotate any secrets or tokens that were present in build environments during that window
  3. Implement dependency pinning with integrity hashing to prevent unexpected package substitution
  4. Enable npm provenance attestations for published packages in your own pipelines
  5. Review code-signing key storage — consider hardware security modules (HSMs) for certificate private keys rather than CI environment variables

What's Next

OpenAI has not published a detailed post-mortem, but the company's rapid certificate revocation suggests a mature incident response process. The re-signed macOS apps are expected to roll out shortly.

The Axios supply chain attack continues to expose downstream victims weeks after the initial compromise — a pattern consistent with nation-state-level supply chain operations that plant long-fuse payloads into high-trust packages.


Sources: The Hacker News, OpenAI disclosure, Google GTIG reporting on UNC1069

#Supply Chain#OpenAI#macOS#GitHub Actions#npm#The Hacker News#General

Related Articles

36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants

Cybersecurity researchers discovered 36 malicious npm packages disguised as Strapi CMS plugins that abused Redis and PostgreSQL connections to harvest...

5 min read

UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack

The North Korean threat actor UNC1069 used a sophisticated, targeted social engineering campaign against the Axios npm package maintainer Jason Saayman to...

4 min read

Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms

Anthropic confirmed that internal source code for its Claude Code AI coding assistant was accidentally published to npm due to a human packaging error. No...

5 min read
Back to all News