OpenAI Rotates Security Certificates, Forces macOS App Updates After Supply Chain Breach
OpenAI announced in mid-April that it is revoking and rotating its macOS application security certificates following a March 31 software supply chain attack that exposed its code-signing materials. The company is requiring all users of its macOS desktop apps, including ChatGPT Desktop, to update to the latest versions before a May 8, 2026, deadline to maintain functionality and security.
The incident occurred when a misconfigured automated workflow in OpenAI’s development process downloaded a malicious version of Axios, a widely used third-party developer library. According to reports from Reuters and CNBC, the broader attack on Axios is believed to be linked to actors associated with North Korea. The compromised workflow had access to the digital certificate OpenAI uses to sign its macOS applications, a crucial security measure that verifies to Apple and its users that the software is authentic and has not been tampered with.
For small and mid-sized businesses, an incident like this at a major vendor like OpenAI serves as a critical wake-up call about third-party risk. Companies increasingly rely on a complex web of software and cloud services to run their operations, but the security posture of each vendor becomes a potential vulnerability for their own business. A compromised tool, especially one as integrated as an AI desktop application, can create significant operational and financial liabilities. The threat is not just a theoretical data breach; it's the potential for business interruption, the cost of remediation, and the reputational damage that follows. This highlights the urgent need for robust vendor due diligence and proactive risk assessment.
Our experience shows that many businesses lack a formal process for evaluating the security dependencies of the software they use daily. Assessing these downstream risks is a core component of effective financial risk management. It involves understanding not just your own security, but the integrity of your entire operational toolkit. We help clients build frameworks to identify and mitigate these hidden exposures before they become costly emergencies. To learn how to better protect your operations from third-party software risks, contact C&S Finance Group LLC at csfinancegroup.com.
In a statement, OpenAI confirmed that on March 31, its systems downloaded the malicious Axios package, version 1.14.1. If a malicious actor had successfully stolen the exposed certificate, they could have used it to sign their own harmful software, making it appear as a legitimate application from OpenAI. This could trick users into installing malware, potentially giving attackers access to their systems.
While OpenAI stated that its analysis concluded the signing certificate was “likely not successfully exfiltrated,” it is treating the certificate as compromised “out of an abundance of caution.” As part of its response, the company engaged a third-party digital forensics firm to investigate the breach, rebuilt all affected applications with a new certificate, and is working with Apple to prevent any new software from being notarized with the old, compromised certificate.
As a direct consequence of the certificate revocation, all users of OpenAI’s macOS desktop apps must update their software. Effective May 8, 2026, older versions of the apps will no longer receive updates or support and may become non-functional. According to OpenAI, macOS security protections will block new downloads and launches of any software signed with the previous certificate after that date. The earliest versions signed with the updated, secure certificate are ChatGPT Desktop 1.2026.051, Codex App 26.406.40811, Codex CLI 0.119.0, and Atlas 1.2026.84.2.
This event is a prominent example of a software supply chain attack, a type of cyberattack that targets a trusted third-party vendor or an open-source component rather than the final target itself. By compromising one element in the development pipeline, attackers can infect legitimate products that are then distributed to thousands of downstream customers. This method has become increasingly common because it allows attackers to bypass the direct security defenses of their ultimate targets.
OpenAI has sought to reassure its users by confirming that the incident did not affect user data, passwords, or API keys. The company also stated that it found no evidence its internal systems or intellectual property were compromised, nor that any of its published software was altered with malicious code. The root cause of the breach, a misconfiguration in a GitHub Actions workflow that allowed the malicious library to be executed, has since been addressed.
Moving forward, business users of OpenAI’s macOS products must ensure their applications are updated before the May 8 deadline to avoid operational disruptions. The high-profile nature of the incident is expected to prompt wider scrutiny across the technology sector regarding the security of development pipelines and the management of third-party software dependencies, pushing companies to re-evaluate their own vulnerability to similar supply chain attacks.