Close Menu
AI News TodayAI News Today

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    After sale of its shoe business, Allbirds pivots to AI

    It’s Tax Day, and no one knows how to file for prediction market winnings

    What’s the deal with Alzheimer’s disease and amyloid?

    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook X (Twitter) Instagram Pinterest Vimeo
    AI News TodayAI News Today
    • Home
    • Shop
    • AI News
    • AI Reviews
    • AI Tools
    • AI Tutorials
    • Chatbots
    • Free AI Tools
    AI News TodayAI News Today
    Home»AI Tutorials»Our response to the Axios developer tool compromise
    AI Tutorials

    Our response to the Axios developer tool compromise

    By No Comments5 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Our response to the Axios developer tool compromise
    Share
    Facebook Twitter LinkedIn Pinterest Email

    We recently identified a security issue involving a third-party developer tool, Axios, that was part of a widely reported, broader industry incident⁠(opens in a new window). Out of an abundance of caution we are taking steps to protect the process that certifies our macOS applications are legitimate OpenAI apps. We found no evidence that OpenAI user data was accessed, that our systems or intellectual property was compromised, or that our software was altered. 

    We are updating our security certificates, which will require all macOS users to update their OpenAI apps to the latest versions. This helps prevent any risk—however unlikely—of someone attempting to distribute a fake app that appears to be from OpenAI. You can update safely through an in-app update or at the official links below:

    The security and privacy of your information are a top priority. We’re committed to being transparent and taking quick action when issues arise. We’re sharing more technical details and FAQs below.

    On March 31, 2026 (UTC), Axios, a widely used third-party developer library, was compromised as part of a broader software supply chain attack.⁠(opens in a new window) At that time, a GitHub Actions workflow we use in the macOS app-signing process downloaded and executed a malicious version of Axios (version 1.14.1). This workflow had access to a certificate and notarization material used for signing macOS applications, including ChatGPT Desktop, Codex, Codex-cli, and Atlas. This certificate helps customers know that software comes from the legitimate developer, OpenAI. 

    Our analysis of the incident concluded that the signing certificate present in this workflow was likely not successfully exfiltrated by the malicious payload due to the timing of the payload execution, certificate injection into the job, sequencing of the job itself, and other mitigating factors. Nevertheless, out of an abundance of caution we are treating the certificate as compromised, and are revoking and rotating it. 

    Effective May 8, 2026, older versions of our macOS desktop apps will no longer receive updates or support, and may not be functional. These versions represent the earliest releases signed with our updated certificate:

    • ChatGPT Desktop: 1.2026.051
    • Codex App: 26.406.40811
    • Codex CLI: 0.119.0
    • Atlas: 1.2026.84.2

    As part of our investigation and response, we engaged a third-party digital forensics and incident response firm, rotated our macOS code signing certificate,  published new builds of all relevant macOS products with the new certificate, and are working with Apple to ensure software signed with the previous certificate cannot be newly notarized. We have also reviewed all notarization of software using our previous certificate to confirm no unexpected software notarization occurred with these keys, and validated that our published software did not have unauthorized modifications. At this time, we have found no evidence of compromise or risk to existing software installations.

    In the event that the certificate was successfully compromised by a malicious actor, they could use it to sign their own code, making it appear as legitimate OpenAI software. We have stopped new software notarizations using the old certificate, so new software signed with the old certificate by an unauthorized third party would be blocked by default by macOS security protections unless a user explicitly bypasses them. Once we fully revoke our certificate on May 8th, 2026, new downloads and launches of apps signed with the previous certificate will be blocked by macOS security protections.

    The root cause of this incident was a misconfiguration in the GitHub Actions workflow, which we have addressed. Specifically, the action in question used a floating tag, as opposed to a specific commit hash, and did not have a configured minimumReleaseAge for new packages.

    Were OpenAI products or user data compromised?

    No. We have found no evidence that OpenAI products or user data were compromised or exposed.

    Have you seen malware signed as OpenAI?

    No. We have found no evidence that the potentially exposed notarization and code signing material have been misused, and we have confirmed all notarization events with the impacted material were expected. 

    Do I need to change my password?

    No. Passwords and OpenAI API keys were not affected.

    Does this affect iOS, Android, Linux, or Windows?

    No. This only affects OpenAI macOS apps. This does not affect the web versions of our software. 

    Why are you asking me to update my Mac apps?

    OpenAI identified exposure in a GitHub Actions workflow involved in the macOS app-signing process. Because the exposed workflow was related to macOS app signing, we are proactively rotating the notarization and code signing material used for OpenAI macOS applications. Updating ensures you are running versions signed with our latest certificate. This certificate helps customers know that software comes from the legitimate developer, OpenAI.

    Where do I download the updated macOS apps? 

    Only download OpenAI apps from in-app updates or the official webpages below:

    Do not install apps from links in emails, messages, ads, or third-party download sites. Be cautious of unexpected “OpenAI,” “ChatGPT,” or “Codex” installers sent through email, text, chat messages, ads, file-sharing links, or third-party download sites.

    What happens after May 8, 2026? 

    Effective May 8, 2026, older versions of our macOS desktop apps will no longer receive updates or support, and may not be functional. These versions represent the earliest releases signed with our updated certificate:

    • ChatGPT Desktop: 1.2026.051
    • Codex App: 26.406.40811
    • Codex CLI: 0.119.0
    • Atlas: 1.2026.84.2

    Why are you not revoking the certificate immediately?

    We have worked to block any further notarization of macOS apps with the impacted notarization material. This means that any fraudulent app posing as an OpenAI app using the impacted certificate will lack notarization, and therefore will be blocked by default by macOS security protections unless a user explicitly bypasses those protections. 

    Because new notarization with the previous certificate is blocked, and because the revocation may cause macOS to block new downloads and first-time launches of apps signed with the previous certificate, we are giving our users a 30-day window to update to minimize disruption. This window will help minimize user risk and allow impacted clients to update through built-in update mechanisms, ensuring they are appropriately remediated. 

    We are working with our partners to monitor for any indicators of misuse of the signing certificate, and will accelerate the revocation timeline if we identify malicious activity during this window. 

    Axios compromise developer Response tool
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThe Artemis II mission has ended. Where does NASA go from here?
    Next Article Today’s NYT Mini Crossword Answers for April 11
    • Website

    Related Posts

    AI Tutorials

    Trusted access for the next era of cyber defense

    AI Tutorials

    Turn your best AI prompts into one-click tools in Chrome

    AI Tools

    How to Implement Tool Calling with Gemma 4 and Python

    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    After sale of its shoe business, Allbirds pivots to AI

    0 Views

    It’s Tax Day, and no one knows how to file for prediction market winnings

    0 Views

    What’s the deal with Alzheimer’s disease and amyloid?

    0 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    AI Tutorials

    Quantization from the ground up

    AI Tools

    David Sacks is done as AI czar — here’s what he’s doing instead

    AI Reviews

    Judge sides with Anthropic to temporarily block the Pentagon’s ban

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    After sale of its shoe business, Allbirds pivots to AI

    0 Views

    It’s Tax Day, and no one knows how to file for prediction market winnings

    0 Views

    What’s the deal with Alzheimer’s disease and amyloid?

    0 Views
    Our Picks

    Quantization from the ground up

    David Sacks is done as AI czar — here’s what he’s doing instead

    Judge sides with Anthropic to temporarily block the Pentagon’s ban

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Terms & Conditions
    • Privacy Policy
    • Disclaimer

    © 2026 ainewstoday.co. All rights reserved. Designed by DD.

    Type above and press Enter to search. Press Esc to cancel.