OpenAI Addresses Security Incident Involving Mixpanel
OpenAI has disclosed a security incident connected to Mixpanel, a third-party analytics service utilized for its API product frontend. The company reassured users that the breach was limited to Mixpanel’s systems and did not affect OpenAI’s infrastructure directly.
Overview of the Incident
The security breach was first detected on November 9, 2025, when Mixpanel identified unauthorized access to its systems. This intrusion led to the unauthorized export of a dataset containing some identifiable information related to OpenAI API users. Notably, OpenAI confirmed that none of its consumer products, including ChatGPT, were compromised during this incident.
After being notified by Mixpanel on the same day of the breach, OpenAI received details of the affected dataset for examination on November 25. The company made it clear that despite the breach, valuable information—such as chat logs, API requests, prompts, outputs, API keys, passwords, financial information, and government identification—remained secure.
What Was Exposed?
The dataset that was compromised consisted primarily of analytics data tied to the tracking configurations set up through Mixpanel on the OpenAI API platform. OpenAI specified that the exposed information could include:
- API account names
- Email addresses connected to API accounts
- General location data such as city, state, and country derived from browser metadata
- Details about the user’s operating system and browser
- Referring websites
- Organization or user IDs linked to API accounts
Crucially, OpenAI emphasized that chat content and other sensitive usage data were not included in the breach.
OpenAI’s Proactive Measures
In the wake of the incident, OpenAI swiftly removed Mixpanel from all of its production services and began an in-depth review of the affected datasets. The company is proactively informing any impacted organizations, administrators, and users through direct communication.
OpenAI has communicated its findings, indicating that there are no signs of compromised data beyond those housed in Mixpanel’s systems. Continuous monitoring is underway to detect any misuse related to this incident.
To bolster user trust and enhance its data protection efforts, OpenAI has taken significant actions:
- Terminated its relationship with Mixpanel
- Initiated comprehensive security audits of all third-party vendors
- Implemented stricter security requirements for all partners and service providers
- Conducted a thorough review of its vendor ecosystem
OpenAI remains committed to prioritizing privacy, security, and transparency in all its user interactions.
Risks of Phishing and Social Engineering
While the compromised information does not include highly sensitive data, OpenAI cautioned users that details such as names, email addresses, and user IDs might be exploited in phishing or social engineering attacks.
Users are urged to exercise caution and stay vigilant for any suspicious communications that could contain links or attachments. To mitigate risks, OpenAI recommends that users:
- Verify any messages claiming to originate from OpenAI
- Exercise caution regarding unsolicited communications
- Enable multi-factor authentication (MFA) for additional security
- Avoid sharing passwords, API keys, or verification codes with anyone
Also worth noting is OpenAI’s policy of never requesting sensitive information like passwords or credentials through email, text messages, or chat.
OpenAI intends to update users with new information as investigations continue. Affected users are welcome to reach out at support@openai.com for any queries or needed clarifications.
Please remain alert and informed, ensuring your data security and privacy are top priorities.


