OpenAI Strengthens Security Posture Following Axios npm Supply Chain Attack
The recent Axios npm supply chain attack has prompted significant responses from various organizations, notably OpenAI, which has detailed its exposure and subsequent remediation measures. This incident, which was initially reported on April 1, has been linked to North Korea’s Lazarus Group, a financially motivated cybercrime organization. The Google Threat Intelligence Group confirmed this attribution, identifying the group as UNC1069, active since at least 2018.
OpenAI’s Limited Exposure
OpenAI has acknowledged its involvement in the broader Axios npm supply chain attack, clarifying that while it was affected, there is no evidence indicating a compromise of user data or internal systems. The company stated, “We recently identified a security issue involving a third-party developer tool, Axios, that was part of a widely reported, broader industry incident.” They emphasized that no user data was accessed, nor was there any alteration to their software or compromise of intellectual property.
The exposure occurred on March 31, 2026, when a GitHub Actions workflow, utilized in OpenAI’s macOS app-signing process, executed a malicious version of Axios (v1.14.1). This workflow had access to sensitive code-signing certificates essential for validating applications such as ChatGPT Desktop, Codex, Codex CLI, and Atlas.
Certificate Rotation and Application Updates
In response to the Axios npm supply chain attack, OpenAI has initiated a comprehensive rotation of its macOS code-signing certificates. Although internal analyses suggest that the certificate was likely not exfiltrated, the company is treating it as potentially compromised. To mitigate residual risks, OpenAI is mandating users to update their macOS applications. Older versions of affected applications will lose support and functionality after May 8, 2026. The updated versions will feature new certificates to ensure authenticity.
This measure aims to prevent threat actors from distributing malicious software masquerading as legitimate OpenAI applications, a known risk in supply chain attacks involving code-signing materials.
Investigation and Security Measures
OpenAI has engaged a third-party digital forensics and incident response firm to investigate the implications of the Axios npm supply chain attack. Additionally, the company has coordinated with Apple to block any new notarization attempts using the old certificate.
The following steps have been taken to enhance security:
- Publishing new builds of all affected macOS applications.
- Reviewing all past software notarizations for anomalies.
- Ensuring no unauthorized modifications were made to distributed software.
Thus far, OpenAI has confirmed that no malicious applications signed with its certificate have been identified.
Root Cause: GitHub Workflow Misconfiguration
The root cause of OpenAI’s exposure to the Axios npm supply chain attack has been traced to a misconfiguration in its GitHub Actions workflow. Specifically, the workflow relied on a floating tag rather than a fixed commit hash and lacked a minimum release age for dependencies. These factors increased the risk of inadvertently pulling compromised packages. This incident highlights a broader industry concern regarding the vulnerability of development pipelines to upstream compromises, particularly within open-source ecosystems.
No Impact on User Data or Other Platforms
OpenAI has clarified that the incident is confined strictly to macOS applications, with no impact on iOS, Android, Windows, Linux, or web-based services. The company reassured users that:
- No user data or API keys were compromised.
- No passwords need to be changed.
- No malware signed as OpenAI has been detected.
What Happens Next
OpenAI plans to fully revoke the old certificate on May 8, 2026, following a 30-day transition period. This strategy aims to minimize disruption while providing users ample time to update their applications. After revocation, any software signed with the old certificate will be blocked by macOS security protections, further mitigating the risk of misuse.
Growing Impact of Axios npm Supply Chain Attack
The Axios npm supply chain attack underscores the escalating risks associated with third-party software dependencies. With attribution to a state-sponsored group, this incident illustrates how supply chain attacks are increasingly exploited for financial and strategic objectives. As organizations continue to rely heavily on open-source libraries, this event serves as a critical reminder of the necessity for stricter dependency management, secure development practices, and ongoing monitoring of software pipelines.
For further details on the Axios npm supply chain attack, refer to the original reporting source: thecyberexpress.com.
Keep reading for the latest cybersecurity developments, threat intelligence and breaking updates from across the Middle East.


