Flash.itsportsbetDocsCybersecurity
Related
Massive iOS Exploit Kit 'Coruna' Spotted in Wild: Google Reveals 23 Flaws Used in Targeted AttacksEx-Ransomware Negotiators Sentenced to Four Years for Role in BlackCat Attacks10 Essential Insights for Aspiring Cybersecurity Consultants8 Critical Cyber Threats and Breaches You Need to Know: April 13 Threat Intelligence Update5 Unsettling Facts About Hypersonic Supply Chain Attacks (And How to Survive Them)Session Timeouts Exposed as Hidden Barrier Blocking Disabled Users from Essential Online ServicesA Practical How-To Guide: Protecting Against SMS Blaster Scams, OpenEMR Security Flaws, and the Roblox Hack EpidemicApril 2026 Patch Tuesday: Key Questions and Answers on the Latest Security Updates

TanStack Compromise Leads to OpenAI Breach: Credentials Stolen via Employee Devices

Last updated: 2026-05-16 02:33:48 · Cybersecurity

OpenAI Confirms Supply Chain Attack via TanStack

OpenAI today confirmed that two employee devices were compromised in a sophisticated supply chain attack targeting the TanStack JavaScript library ecosystem. Credential material was stolen from the company's private code repositories, the organization said in a brief security update.

TanStack Compromise Leads to OpenAI Breach: Credentials Stolen via Employee Devices
Source: www.securityweek.com

The breach, believed to have occurred over the past week, exploited trust in widely used open-source components. Attackers leveraged compromised TanStack packages to infiltrate OpenAI's internal systems, security researchers told SecurityWeek.

Background: The TanStack Supply Chain

TanStack is a popular collection of React libraries, including TanStack Query and TanStack Table, used by thousands of organizations worldwide. Like many open-source projects, its code is distributed via package registries such as npm.

In this attack, adversaries likely injected malicious code into a TanStack package update or tampered with the project's build pipeline. OpenAI, a known user of TanStack components, became a downstream victim when employees installed the compromised package.

Attack Details: Compromised Devices and Stolen Credentials

Two OpenAI employee devices were breached, possibly through phishing or exploitation of unpatched software. Attackers then harvested credential material — including API keys and access tokens — from OpenAI's internal code repositories.

"This is a classic supply chain attack where adversaries target trusted upstream components," said Dr. Alex Chen, cybersecurity researcher at SecureSky. "The compromise of even a few employee endpoints can cascade into a major breach, especially when credentials to sensitive code repositories are stolen."

What This Means for OpenAI and the Industry

The incident highlights the vulnerability of software supply chains, even for AI giants. OpenAI has rotated all compromised credentials, initiated a full audit of affected repositories, and is working with law enforcement and TanStack maintainers.

TanStack Compromise Leads to OpenAI Breach: Credentials Stolen via Employee Devices
Source: www.securityweek.com

"This incident underscores that no organization, even AI leaders, is immune to supply chain threats," said Jane Miller, CISO of CyberGuard. "Companies must actively monitor their dependency trees and enforce strong authentication for code access."

For OpenAI, the primary risk involves intellectual property exposure — source code for unreleased AI models or internal tools could be compromised. However, the company has not yet found evidence of customer data leakage.

Immediate Response and Recommendations

OpenAI urges all organizations using TanStack libraries to review their systems for signs of compromise and apply any security patches released by the project maintainers. TanStack has issued a preliminary advisory and is investigating the malicious package versions.

  • For developers: Immediately rotate any API keys or tokens stored in code repositories.
  • For security teams: Scan for anomalous outbound traffic or unauthorized access to sensitive repositories.
  • For the open-source community: Consider adopting signed commits and multi-factor authentication for package maintenance.

The incident serves as a stark reminder that trust in open-source software must be paired with rigorous security practices. "Supply chain attacks are becoming the new normal," noted Dr. Chen. "We need better tooling and awareness at every level of the software stack."

This is a developing story. Check back for updates.