Apr 20, 2026 • Pierluigi Paganini
Third-party AI hack triggers Vercel breach, internal environments accessed
Vercel experienced a security breach stemming from the compromise of Context.ai, a third-party AI tool utilized by an employee. Attackers leveraged this...
Executive Summary
Vercel experienced a security breach stemming from the compromise of Context.ai, a third-party AI tool utilized by an employee. Attackers leveraged this access to hijack the employee's Google Workspace account, gaining entry to limited internal systems and non-sensitive environment variables. While sensitive data stored with specific protections remained secure, the incident highlights risks associated with third-party integrations. The attacker demonstrated advanced skills, prompting Vercel to engage Mandiant for investigation and notify law enforcement. Impact is currently assessed as limited to non-sensitive customer-related data. Mitigation recommendations include rotating exposed secrets such as API keys, reviewing account activity logs, and enforcing stricter controls on environment variables. Organizations using Google Workspace are advised to check for suspicious OAuth applications. This incident underscores the critical need for robust vendor risk management and monitoring of third-party access privileges within cloud development platforms.
Summary
Vercel suffered a breach after a hacked Context.ai tool exposed an employee account, letting attackers access limited internal systems and non-sensitive data. Vercel reported a security breach caused by the compromise of a third-party AI tool, Context.ai, used by one of its employees. The attacker took over the employee’s Google Workspace account and used it […]
Published Analysis
Vercel experienced a security breach stemming from the compromise of Context.ai, a third-party AI tool utilized by an employee. Attackers leveraged this access to hijack the employee's Google Workspace account, gaining entry to limited internal systems and non-sensitive environment variables. While sensitive data stored with specific protections remained secure, the incident highlights risks associated with third-party integrations. The attacker demonstrated advanced skills, prompting Vercel to engage Mandiant for investigation and notify law enforcement. Impact is currently assessed as limited to non-sensitive customer-related data. Mitigation recommendations include rotating exposed secrets such as API keys, reviewing account activity logs, and enforcing stricter controls on environment variables. Organizations using Google Workspace are advised to check for suspicious OAuth applications. This incident underscores the critical need for robust vendor risk management and monitoring of third-party access privileges within cloud development platforms. Vercel suffered a breach after a hacked Context.ai tool exposed an employee account, letting attackers access limited internal systems and non-sensitive data. Vercel reported a security breach caused by the compromise of a third-party AI tool, Context.ai, used by one of its employees. The attacker took over the employee’s Google Workspace account and used it […] Vercel suffered a breach after a hacked Context.ai tool exposed an employee account, letting attackers access limited internal systems and non-sensitive data. Vercel reported a security breach caused by the compromise of a third-party AI tool, Context.ai, used by one of its employees. The attacker took over the employee’s Google Workspace account and used it to access parts of Vercel’s internal systems. This included some environments and non-sensitive variables, exposing a limited amount of customer-related data. “The incident originated with a compromise of Context.ai, a third-party AI tool used by a Vercel employee. The attacker used that access to take over the employee’s Vercel Google Workspace account, which enabled them to gain access to some Vercel environments and environment variables that were not marked as “sensitive.” reads the notice of security incident published by the company. “Environment variables marked as “sensitive” in Vercel are stored in a manner that prevents them from being read, and we currently do not have evidence that those values were accessed.”” Vercel is a cloud platform that helps developers build, deploy, and run modern web applications, especially front-end sites. It’s best known for supporting frameworks like Next.js, allowing teams to quickly publish websites and apps without managing servers directly. Vercel handles things like hosting, scaling, performance optimization, and global content delivery automatically. According to the notice, the attacker showed a high level of skill, moving quickly and demonstrating deep knowledge of its systems. The company is working with cybersecurity firm Mandiant and other security partners to investigate the incident and has notified law enforcement. Vercel is also coordinating with Context.ai to determine the full extent of the breach. Vercel urges users to check account activity logs for suspicious actions, rotate any exposed secrets like API keys or tokens, and review recent deployments. It also recommends enabling stronger protections, such as marking sensitive environment variables and updating security tokens. The investigation found the breach started from a compromised third-party AI tool linked to Google Workspace, potentially impacting many organizations. Vercel shared The notice urges Google Workspace admins and users to check for the following suspicious OAuth app ID linked to the breach and remove it if found: 110671459871-30f1spbu0hptbs60cb4vsmv79i7bbvqj.apps.googleusercontent.com Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini ( SecurityAffairs – hacking, security breach)