OpenAI's TanStack Supply Chain Breach: What the Codex CLI Cert Rotation Means for Your Dev Toolchain

OpenAI confirmed two employee devices were hit by the Mini Shai-Hulud npm supply chain attack, exposing code-signing certificates for Codex CLI, ChatGPT Desktop, and Atlas. macOS users must update before June 12 or their apps will stop working.

TheRouter Newsroomисточник OpenAI
Terminal window showing npm audit output with supply chain vulnerability warning on dark background
Эта статья сейчас показывается на языке оригинала. Русская версия локализует навигацию и метаданные, но не переписывает содержание источника.

Terminal window showing npm audit output with supply chain vulnerability warning on dark background

The operational question for AI engineering teams this week is not theoretical: if your macOS developers use Codex CLI, ChatGPT Desktop, or Atlas, they have until June 12, 2026 to update — or those apps will stop launching. That deadline, buried inside OpenAI's security disclosure from May 13, is the direct result of a code-signing certificate rotation triggered by the TanStack npm supply chain attack.

What happened

On May 11, 2026, the TanStack npm library was compromised as part of a broader campaign called "Mini Shai-Hulud", a coordinated supply chain attack targeting widely-used open-source packages. Two OpenAI employee devices in the corporate environment installed the malicious package before OpenAI's phased rollout of package provenance controls reached those machines.

The attacker exfiltrated a limited set of credentials from internal source code repositories accessible to the two affected employees. Critically, among those repositories were OpenAI's code-signing certificates — the keys used to sign and notarize macOS, iOS, Windows, and Android applications including Codex CLI, the Codex App, ChatGPT Desktop, and Atlas.

OpenAI confirmed:

  • No production systems or customer data were accessed
  • No API keys or user passwords were affected
  • No evidence of malicious software signed with OpenAI's certificates
  • All impacted credentials have been rotated

Why it matters for AI engineering teams

This incident illustrates two compounding risks that any team running AI developer tooling faces.

First: npm supply chain attacks now reach internal developer machines, not just CI pipelines. The Mini Shai-Hulud campaign specifically targeted development toolchain packages. If your developers install a compromised package locally before your security controls propagate, the blast radius can include code-signing certificates — arguably the highest-value credential class in a software publisher's possession.

Second: certificate rotation forces a hard cutoff for existing app installs. Starting June 12, 2026, macOS security (Gatekeeper) will block any app signed with OpenAI's old certificates from launching on first run or after updates. The affected versions are:

| App | Last old-cert version | |-----|----------------------| | ChatGPT Desktop | 1.2026.118 | | Codex App | 26.506.31421 | | Codex CLI | 0.130.0 | | Atlas | 1.2026.119.1 |

Teams that automate Codex CLI in CI workflows or developer provisioning scripts need to verify their install sources and pin to current versions before the deadline.

The router/operator angle

For teams using OpenAI's APIs through TheRouter or directly, API keys and user data were explicitly not affected — the attack targeted local developer tooling, not OpenAI's API infrastructure. Your existing integrations, billing, and usage ledgers are unaffected.

However, this event surfaces a supply chain governance question that every AI engineering team should be asking:

How do you trust the developer tools in your AI workflow?

Key decisions for AI teams after this incident:

  1. Audit Codex CLI installations across your team. Pin to the latest signed release (codex --version to check). Ensure developers are downloading only from official sources: github.com/openai/codex, chatgpt.com/download, or in-app updates.

  2. Review your npm dependency policy for AI tooling. OpenAI responded by deploying minimumReleaseAge controls in npm package manager configuration — a policy that delays accepting newly published package versions, giving the community time to spot malicious updates. This is a concrete, portable practice your own CI pipeline can adopt.

  3. Treat code-signing certificate exposure as a tier-1 incident. Even without evidence of misuse, OpenAI rotated every signing key for every platform. That response standard — rotate first, investigate in parallel — is the right playbook for developer-toolchain credential exposure.

  4. Check your own developer machine provisioning. If developers install npm packages as part of local AI agent or coding-assistant setup, the same attack class applies to your toolchain, not just OpenAI's.

What to watch

  • June 12, 2026: Hard deadline for macOS ChatGPT Desktop, Codex CLI, Codex App, and Atlas updates. After this date, apps signed with the old certificate will not launch on new downloads or first runs.
  • OpenAI's follow-up Codex CLI release: Watch github.com/openai/codex/releases for the re-signed CLI build; pin your CI install scripts to versions above 0.130.0.
  • Mini Shai-Hulud campaign scope: The NHS Digital alert covers the broader attack campaign. If your team uses TanStack libraries directly, audit your own dependency tree.

The broader pattern here — attackers targeting shared developer tooling rather than production APIs — is why supply chain observability and package provenance belong in AI engineering team runbooks, not just in security team annual reviews.


Source: OpenAI Security Disclosure, May 13, 2026

Похожие материалы

Новости AI
Graph showing cost disparity between published AI model rates and actual billed costs across different tokenizers and usage patterns

AI Cost Increases 2026: Why List Price is No Longer Enough

OpenAI, Anthropic, and GitHub changed pricing models in the same week. List price gaps reach 92% depending on tokenizer behavior and usage patterns. Routing architectures are now essential for cost control.

источник FairMind / OpenRouter data
Поддержка