Vercel Breach Exposes Customer Credentials via Compromised Third‑Party AI Tool
What Happened – Vercel disclosed that a hacker accessed internal databases and multiple employee accounts after compromising Context.ai, a third‑party AI assistant installed on an employee’s device. The attacker leveraged the employee’s Google Workspace credentials to reach Vercel environments and retrieve non‑sensitive environment variables, leading to the exposure of a limited subset of customer credentials.
Why It Matters for TPRM –
- Demonstrates how a supply‑chain compromise of a seemingly benign SaaS tool can cascade into a cloud‑service provider breach.
- Highlights the risk of credential reuse and insufficient segmentation of privileged access in third‑party integrations.
- Forces downstream vendors and customers to reassess their own secret‑management and token‑rotation policies.
Who Is Affected – Technology SaaS (cloud hosting) providers, their development‑platform customers, and any downstream services that consume Vercel‑hosted APIs or environment variables.
Recommended Actions –
- Instruct all Vercel‑using customers to rotate API keys, OAuth tokens, and any credentials stored in Vercel environments immediately.
- Conduct a third‑party risk review of all AI/automation tools with access to corporate accounts; enforce least‑privilege and MFA.
- Audit environment variable classifications; mark all secrets as “sensitive” and verify storage isolation.
- Verify that deleted projects cannot retain residual secrets; implement secret‑rotation before decommissioning.
Technical Notes – The breach stemmed from a compromised Context.ai browser extension that obtained the employee’s Google Workspace OAuth token. The attacker used this token to infiltrate Vercel’s internal Google Workspace, then accessed Vercel projects and non‑sensitive environment variables. No evidence yet that “sensitive” variables were read. Prior to this incident, Context.ai suffered an AWS‑environment breach in March, suggesting a pattern of supply‑chain weakness. Source: The Record