Summary
OpenAI disclosed that two employee devices were affected in the TanStack npm supply chain attack and said limited credential material was exfiltrated from a subset of internal source-code repositories. The company said it found no evidence that user data, production systems, or product code were compromised, but it is rotating code-signing certificates and requiring macOS users to update their OpenAI desktop apps by June 12, 2026.
What changed
OpenAI published its incident response, rotated signing certificates, and required macOS users to update ChatGPT Desktop, Codex App, Codex CLI, and Atlas to newly signed versions.
Why it matters
This is a concrete example of AI tooling vendors inheriting the same build-chain and package ecosystem risk as any modern software company. The operational response also shows how supply-chain incidents can cascade into forced desktop certificate rotations and user update deadlines even when customer data is unaffected.
Evidence excerpt
OpenAI said two employee devices were impacted, limited credential material was exfiltrated from a subset of internal repositories, and macOS users must update to newly signed app versions before June 12, 2026.