TanStack Compromise Leads to OpenAI Breach: Credentials Stolen via Employee Devices
OpenAI Confirms Supply Chain Attack via TanStack
OpenAI today confirmed that two employee devices were compromised in a sophisticated supply chain attack targeting the TanStack JavaScript library ecosystem. Credential material was stolen from the company's private code repositories, the organization said in a brief security update.

The breach, believed to have occurred over the past week, exploited trust in widely used open-source components. Attackers leveraged compromised TanStack packages to infiltrate OpenAI's internal systems, security researchers told SecurityWeek.
Background: The TanStack Supply Chain
TanStack is a popular collection of React libraries, including TanStack Query and TanStack Table, used by thousands of organizations worldwide. Like many open-source projects, its code is distributed via package registries such as npm.
In this attack, adversaries likely injected malicious code into a TanStack package update or tampered with the project's build pipeline. OpenAI, a known user of TanStack components, became a downstream victim when employees installed the compromised package.
Attack Details: Compromised Devices and Stolen Credentials
Two OpenAI employee devices were breached, possibly through phishing or exploitation of unpatched software. Attackers then harvested credential material — including API keys and access tokens — from OpenAI's internal code repositories.
"This is a classic supply chain attack where adversaries target trusted upstream components," said Dr. Alex Chen, cybersecurity researcher at SecureSky. "The compromise of even a few employee endpoints can cascade into a major breach, especially when credentials to sensitive code repositories are stolen."
What This Means for OpenAI and the Industry
The incident highlights the vulnerability of software supply chains, even for AI giants. OpenAI has rotated all compromised credentials, initiated a full audit of affected repositories, and is working with law enforcement and TanStack maintainers.

"This incident underscores that no organization, even AI leaders, is immune to supply chain threats," said Jane Miller, CISO of CyberGuard. "Companies must actively monitor their dependency trees and enforce strong authentication for code access."
For OpenAI, the primary risk involves intellectual property exposure — source code for unreleased AI models or internal tools could be compromised. However, the company has not yet found evidence of customer data leakage.
Immediate Response and Recommendations
OpenAI urges all organizations using TanStack libraries to review their systems for signs of compromise and apply any security patches released by the project maintainers. TanStack has issued a preliminary advisory and is investigating the malicious package versions.
- For developers: Immediately rotate any API keys or tokens stored in code repositories.
- For security teams: Scan for anomalous outbound traffic or unauthorized access to sensitive repositories.
- For the open-source community: Consider adopting signed commits and multi-factor authentication for package maintenance.
The incident serves as a stark reminder that trust in open-source software must be paired with rigorous security practices. "Supply chain attacks are becoming the new normal," noted Dr. Chen. "We need better tooling and awareness at every level of the software stack."
This is a developing story. Check back for updates.
Related Articles
- Trellix Source Code Breach: Unauthorized Access Confirmed, Investigation Underway
- Massive Russian Cyber Operation Exploits Old Routers to Steal Microsoft Authentication Tokens
- Zara Cyberattack: 197,000 Customers' Data Compromised in Major Breach
- 5 AI Security Blind Spots That Attackers Exploit Every Day
- Dirty Frag: 10 Essential Things You Need to Know About the Latest Linux Privilege Escalation Attack
- Data Gaps Beyond the Endpoint: Unit 42 Urges Broader Detection Strategy
- Weekly Cyber Threat Intelligence Q&A: April 27 Edition
- Decoding SHADOW-EARTH-053: A Q&A on China-Linked Cyber Espionage