Vercel confirms breach after Context.ai compromise exposed some customer secrets


Vercel has confirmed a security incident that led to unauthorized access to some internal systems and the exposure of non-sensitive environment variables for a limited subset of customers. The company says the attack started with the compromise of Context.ai, a third-party AI tool used by a Vercel employee, and later spread into that employee’s Google Workspace and Vercel access.

The most important detail for customers is this: Vercel says environment variables that were not marked as “sensitive” should be treated as exposed and rotated immediately. These may include API keys, tokens, database credentials, and signing keys. Vercel also says secrets marked as “sensitive” show no evidence of being accessed in this incident.

The company first published its bulletin on April 19, 2026, and expanded it over the following days as the investigation continued. By April 24, Vercel said it had identified a small number of additional accounts tied to this incident, while also finding a separate set of customer accounts with signs of compromise that do not appear to have originated on Vercel systems.

How the breach happened

According to Vercel, the incident originated with Context.ai, whose legacy AI Office Suite product suffered its own security incident. Context.ai says OAuth tokens belonging to some Office Suite users were compromised, and that one of those tokens was then used to access Vercel’s Google Workspace through a Vercel employee who had granted broad Google Workspace permissions to the app.

From there, Vercel says the attacker took over the employee’s individual Google Workspace account, gained access to that employee’s Vercel account, then pivoted into a Vercel environment and moved through systems to enumerate and decrypt non-sensitive environment variables. Vercel describes the attacker as highly sophisticated because of the speed of the intrusion and the attacker’s familiarity with Vercel’s product API surface.

Context.ai says the affected product was a deprecated consumer offering, not its current enterprise platform. The company also says its Bedrock enterprise deployments run in customer-owned infrastructure and were not affected by this incident.

What customer data was affected

Vercel says the exposed data involved non-sensitive environment variables stored in a readable form. That matters because environment variables often contain the operational secrets that power production services, even when they do not include personal customer records by themselves. Vercel explicitly warns that deleting a project or even deleting an account does not remove the risk if those secrets remain active elsewhere.

The company has not publicly disclosed an exact number of affected customers. It says it initially found a limited subset, later identified a small number of additional compromised accounts, and directly notified those customers with guidance to rotate credentials.

Vercel also says there is no evidence that its npm packages were compromised. In collaboration with GitHub, Microsoft, npm, and Socket, the company says it validated that packages published by Vercel were not tampered with and that the software supply chain remains safe.

What Vercel is telling customers to do now

Customers should rotate any environment variables that were not marked as sensitive. Vercel specifically lists API keys, tokens, database credentials, and signing keys as high-priority secrets that should be changed.

The company also urges customers to enable multi-factor authentication, ideally with an authenticator app or a passkey. In addition, customers should review account activity logs, inspect recent deployments for anything suspicious, and ensure Deployment Protection is set to at least Standard.

vercel breach

Vercel has also published one indicator of compromise for the wider community: the OAuth app client ID 110671459871-30f1spbu0hptbs60cb4vsmv79i7bbvqj.apps.googleusercontent.com. Vercel says Google Workspace administrators and Google Account owners should check for usage of that app immediately.

Quick facts

ItemDetails
CompanyVercel
Incident disclosedApril 19, 2026
Latest official update cited hereApril 24, 2026
Entry pointCompromised Context.ai AI Office Suite OAuth tokens
Main impactExposure of non-sensitive environment variables
Sensitive secretsNo evidence of access, according to Vercel
Software supply chainNo evidence Vercel-published npm packages were compromised
Published IOCGoogle OAuth app client ID linked in Vercel bulletin
  • Rotate all non-sensitive environment variables immediately, especially API keys, tokens, database credentials, and signing keys.
  • Enable multi-factor authentication with an authenticator app or passkey.
  • Mark future secrets as sensitive so they cannot be read in plaintext through normal dashboard access.
  • Review activity logs in the dashboard or CLI for suspicious access.
  • Audit recent deployments and confirm Deployment Protection is set to Standard or higher.
  • Check your Google Workspace for the published OAuth app IOC if your organization may have used the affected Context.ai product.

FAQ

Did Vercel confirm a breach?

Yes. Vercel says it identified a security incident involving unauthorized access to certain internal systems.

What was exposed in the Vercel incident?

Vercel says a limited subset of customers had non-sensitive environment variables exposed. These may include API keys, tokens, database credentials, and signing keys.

Were Vercel’s sensitive environment variables accessed?

Vercel says it has found no evidence that environment variables marked as sensitive were accessed in this incident.

Did the breach start inside Vercel?

Based on Vercel’s and Context.ai’s public statements, the incident began with the compromise of Context.ai’s legacy AI Office Suite product and the theft of OAuth tokens, not with a flaw publicly disclosed in Vercel’s core platform itself.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages