OpenAI's TanStack Supply Chain Breach: What the Codex CLI Cert Rotation Means for Your Dev Toolchain
OpenAI confirmed two employee devices were hit by the Mini Shai-Hulud npm supply chain attack, exposing code-signing certificates for Codex CLI, ChatGPT Desktop, and Atlas. macOS users must update before June 12 or their apps will stop working.


The operational question for AI engineering teams this week is not theoretical: if your macOS developers use Codex CLI, ChatGPT Desktop, or Atlas, they have until June 12, 2026 to update — or those apps will stop launching. That deadline, buried inside OpenAI's security disclosure from May 13, is the direct result of a code-signing certificate rotation triggered by the TanStack npm supply chain attack.
What happened
On May 11, 2026, the TanStack npm library was compromised as part of a broader campaign called "Mini Shai-Hulud", a coordinated supply chain attack targeting widely-used open-source packages. Two OpenAI employee devices in the corporate environment installed the malicious package before OpenAI's phased rollout of package provenance controls reached those machines.
The attacker exfiltrated a limited set of credentials from internal source code repositories accessible to the two affected employees. Critically, among those repositories were OpenAI's code-signing certificates — the keys used to sign and notarize macOS, iOS, Windows, and Android applications including Codex CLI, the Codex App, ChatGPT Desktop, and Atlas.
OpenAI confirmed:
- No production systems or customer data were accessed
- No API keys or user passwords were affected
- No evidence of malicious software signed with OpenAI's certificates
- All impacted credentials have been rotated
Why it matters for AI engineering teams
This incident illustrates two compounding risks that any team running AI developer tooling faces.
First: npm supply chain attacks now reach internal developer machines, not just CI pipelines. The Mini Shai-Hulud campaign specifically targeted development toolchain packages. If your developers install a compromised package locally before your security controls propagate, the blast radius can include code-signing certificates — arguably the highest-value credential class in a software publisher's possession.
Second: certificate rotation forces a hard cutoff for existing app installs. Starting June 12, 2026, macOS security (Gatekeeper) will block any app signed with OpenAI's old certificates from launching on first run or after updates. The affected versions are:
| App | Last old-cert version | |-----|----------------------| | ChatGPT Desktop | 1.2026.118 | | Codex App | 26.506.31421 | | Codex CLI | 0.130.0 | | Atlas | 1.2026.119.1 |
Teams that automate Codex CLI in CI workflows or developer provisioning scripts need to verify their install sources and pin to current versions before the deadline.
The router/operator angle
For teams using OpenAI's APIs through TheRouter or directly, API keys and user data were explicitly not affected — the attack targeted local developer tooling, not OpenAI's API infrastructure. Your existing integrations, billing, and usage ledgers are unaffected.
However, this event surfaces a supply chain governance question that every AI engineering team should be asking:
How do you trust the developer tools in your AI workflow?
Key decisions for AI teams after this incident:
-
Audit Codex CLI installations across your team. Pin to the latest signed release (
codex --versionto check). Ensure developers are downloading only from official sources:github.com/openai/codex,chatgpt.com/download, or in-app updates. -
Review your npm dependency policy for AI tooling. OpenAI responded by deploying
minimumReleaseAgecontrols in npm package manager configuration — a policy that delays accepting newly published package versions, giving the community time to spot malicious updates. This is a concrete, portable practice your own CI pipeline can adopt. -
Treat code-signing certificate exposure as a tier-1 incident. Even without evidence of misuse, OpenAI rotated every signing key for every platform. That response standard — rotate first, investigate in parallel — is the right playbook for developer-toolchain credential exposure.
-
Check your own developer machine provisioning. If developers install npm packages as part of local AI agent or coding-assistant setup, the same attack class applies to your toolchain, not just OpenAI's.
What to watch
- June 12, 2026: Hard deadline for macOS ChatGPT Desktop, Codex CLI, Codex App, and Atlas updates. After this date, apps signed with the old certificate will not launch on new downloads or first runs.
- OpenAI's follow-up Codex CLI release: Watch
github.com/openai/codex/releasesfor the re-signed CLI build; pin your CI install scripts to versions above0.130.0. - Mini Shai-Hulud campaign scope: The NHS Digital alert covers the broader attack campaign. If your team uses TanStack libraries directly, audit your own dependency tree.
The broader pattern here — attackers targeting shared developer tooling rather than production APIs — is why supply chain observability and package provenance belong in AI engineering team runbooks, not just in security team annual reviews.
Похожие материалы
Новости AI →
OpenAI Embeds C2PA + SynthID in Every API-Generated Image: What It Means for Your AI Pipeline
OpenAI is now a C2PA conforming generator with Google SynthID watermarks in every API-generated image. Every output carries a cryptographic provenance fingerprint — affecting audit trails, fallback routing, and enterprise content governance.

AI Cost Increases 2026: Why List Price is No Longer Enough
OpenAI, Anthropic, and GitHub changed pricing models in the same week. List price gaps reach 92% depending on tokenizer behavior and usage patterns. Routing architectures are now essential for cost control.

DeepSeek Now Speaks Anthropic: What the New Dual-Format API Means for Your Routing Layer
DeepSeek's API now accepts Anthropic SDK format at api.deepseek.com/anthropic — meaning Claude Code, the Anthropic Python/TS SDK, and any Anthropic-native client can now route requests to DeepSeek V4 models without an OpenAI wrapper.