TanStack Compromise Leads to OpenAI Breach: Credentials Stolen via Employee Devices
OpenAI Confirms Supply Chain Attack via TanStack
OpenAI today confirmed that two employee devices were compromised in a sophisticated supply chain attack targeting the TanStack JavaScript library ecosystem. Credential material was stolen from the company's private code repositories, the organization said in a brief security update.

The breach, believed to have occurred over the past week, exploited trust in widely used open-source components. Attackers leveraged compromised TanStack packages to infiltrate OpenAI's internal systems, security researchers told SecurityWeek.
Background: The TanStack Supply Chain
TanStack is a popular collection of React libraries, including TanStack Query and TanStack Table, used by thousands of organizations worldwide. Like many open-source projects, its code is distributed via package registries such as npm.
In this attack, adversaries likely injected malicious code into a TanStack package update or tampered with the project's build pipeline. OpenAI, a known user of TanStack components, became a downstream victim when employees installed the compromised package.
Attack Details: Compromised Devices and Stolen Credentials
Two OpenAI employee devices were breached, possibly through phishing or exploitation of unpatched software. Attackers then harvested credential material — including API keys and access tokens — from OpenAI's internal code repositories.
"This is a classic supply chain attack where adversaries target trusted upstream components," said Dr. Alex Chen, cybersecurity researcher at SecureSky. "The compromise of even a few employee endpoints can cascade into a major breach, especially when credentials to sensitive code repositories are stolen."
What This Means for OpenAI and the Industry
The incident highlights the vulnerability of software supply chains, even for AI giants. OpenAI has rotated all compromised credentials, initiated a full audit of affected repositories, and is working with law enforcement and TanStack maintainers.

"This incident underscores that no organization, even AI leaders, is immune to supply chain threats," said Jane Miller, CISO of CyberGuard. "Companies must actively monitor their dependency trees and enforce strong authentication for code access."
For OpenAI, the primary risk involves intellectual property exposure — source code for unreleased AI models or internal tools could be compromised. However, the company has not yet found evidence of customer data leakage.
Immediate Response and Recommendations
OpenAI urges all organizations using TanStack libraries to review their systems for signs of compromise and apply any security patches released by the project maintainers. TanStack has issued a preliminary advisory and is investigating the malicious package versions.
- For developers: Immediately rotate any API keys or tokens stored in code repositories.
- For security teams: Scan for anomalous outbound traffic or unauthorized access to sensitive repositories.
- For the open-source community: Consider adopting signed commits and multi-factor authentication for package maintenance.
The incident serves as a stark reminder that trust in open-source software must be paired with rigorous security practices. "Supply chain attacks are becoming the new normal," noted Dr. Chen. "We need better tooling and awareness at every level of the software stack."
This is a developing story. Check back for updates.
Related Articles
- Weekly Cyber Threat Digest: April 27th – Major Breaches, AI Exploits, and Critical Patches
- Snowden Leaks: Former NSA Chief Chris Inglis on Mistakes, Insider Threats, and Media Disclosures
- Breathing New Life into a 1947 Arvin 664A AM Radio: A Restoration Journey
- How to Secure Your Linux System Against the Dirty Frag Vulnerability: Upgrading to Kernel 7.0.6 or 6.18.29
- Oracle Shifts to Monthly Emergency Patches for Critical Security Flaws
- How to Secure Your System by Upgrading to the Latest Stable Kernels with Dirty Frag and Copy Fail 2 Patches
- How to Protect Your LiteLLM Deployment from the CVE-2026-42208 SQL Injection Vulnerability
- Meta Unveils Major Security Upgrade for End-to-End Encrypted Backups