The Vercel supply chain attack via Context AI has become a defining moment for SaaS security. It shows how even mature, security-aware organisations can be exposed through trusted third-party integrations.
Vercel, a widely used cloud platform for developers, became the primary victim. The entry point was not a direct exploit of its infrastructure. Instead, it came through a connected application that appeared harmless.
This incident highlights a growing concern for security leaders. Employees connect tools every day. OAuth permissions are granted quickly. Yet, each of these actions quietly expands the attack surface.
What happened to Vercel is not an isolated case. It reflects a broader shift in how attackers operate. And it raises an urgent question. How secure is your SaaS ecosystem, really?
Understanding the Vercel supply chain attack
To fully grasp the impact, we need to break down the relationship that made this attack possible.
The organisations involved
At the centre of the incident are Vercel and Context AI.
Vercel provides cloud infrastructure that powers modern web applications. Many enterprises rely on it to deploy and scale services.
Context AI builds tools to analyse and evaluate AI models. Its application integrated with user environments through OAuth, creating a trust link.
That connection became the attacker’s pathway into Vercel.
The attacker profile
The identity of the attacker remains unknown. There were claims associating the breach with ShinyHunters, but these were denied.
What stands out is the execution. Vercel described the attacker as highly sophisticated. They moved quickly and showed a deep understanding of internal systems.
This was not random. It was deliberate.
What was compromised at Vercel
The breach directly impacted Vercel’s internal environment and customer-linked data.
- Exposure of customer credentials: Attackers accessed API keys associated with customer accounts. These keys can grant access to applications, services, and sensitive workflows.
- Access to source code and databases: Reports indicate that source code and database credentials were also exposed. This combination increases the risk of further exploitation.
- Systems that remained secure: Vercel confirmed that core open-source projects like Next.js and Turbopack were not compromised.
This helped contain ecosystem-wide risk. However, the exposure of customer-specific data still presents serious challenges.
Timeline of the Vercel breach
The attack did not begin with Vercel. But it ended there, making it the primary victim.
- Initial compromise in March 2026: Attackers breached Context AI’s Office Suite application. They quietly captured OAuth tokens during this phase.
- Silent persistence: With valid tokens, the attackers maintained access without raising alarms. This allowed them to plan their next move.
- Impact on Vercel in April 2026: The attackers used the compromised tokens to access Vercel’s environment. By the time the breach became visible, sensitive data had already been extracted. This delay highlights a key risk. Supply chain attacks often remain hidden until damage is done.
How Vercel was breached: step-by-step breakdown
The path into Vercel’s systems began with a routine action.
Employee installs a third-party app
A Vercel employee installed the Context AI application and connected it to their Google Workspace account via OAuth. This action is common across organisations. It rarely triggers concern.
OAuth token compromise
Attackers exploited vulnerabilities in Context AI’s application to access OAuth tokens. These tokens allowed them to act as the user without needing login credentials.
Account takeover
Using the tokens, the attackers gained control of the employee’s account. This provided direct access to Vercel’s internal systems.
Lateral movement
From there, they explored internal environments and accessed environment variables. Some of these were not encrypted, exposing sensitive data in plain text.
Why the Vercel incident matters
This attack is not just about one organisation. It reflects a shift in how threats target modern enterprises. Vercel’s environment was not compromised in isolation. It was part of a broader SaaS ecosystem. Every integration increases complexity. And with complexity comes risk.
Trust is now a vulnerability. The attack succeeded because of a trusted connection. Employees rely on tools. Systems rely on integrations. Attackers exploit this trust. Vercel indicated that hundreds of users could be affected. This shows how one compromised account can create widespread consequences.
Key Security Lessons from the Vercel Breach
Security leaders can take clear, actionable insights from this incident.
- Strengthen third-party application governance: Organisations must track and manage all connected applications. Without visibility, risk grows unnoticed.
- Enforce least-privilege access: Applications should only access what is necessary. Limiting permissions reduces potential damage.
- Encrypt sensitive environment data: Sensitive values should never be stored in plaintext. Encryption adds a critical layer of protection.
- Enhance identity and access controls: Multi-factor authentication and stricter identity policies can slow attackers and limit access.
- Monitor behavioural anomalies: Unusual access patterns often signal compromise. Early detection can prevent escalation.
The Vercel breach shows that traditional security boundaries no longer apply. Start with visibility. Identify all integrations. Then enforce control. Limit access and secure sensitive data. Finally, improve response capabilities. Detect threats early and act quickly. Security is not static. It evolves with your environment.
Conclusion
The Vercel supply chain attack via Context AI is a clear example of how modern breaches unfold. A trusted integration became the entry point. A single account became the bridge. And from there, the impact spread across systems and users.
For security leaders, the takeaway is direct. Your defence strategy must extend beyond your infrastructure. It must include every connection, every application, and every permission granted.
At CyberNX, we help organisations uncover hidden risks across their SaaS environments and build stronger, more resilient security frameworks. If you want to understand your exposure and take control of third-party risks, connect with our experts today.
Vercel breach FAQs
Why was Vercel the primary victim in this attack?
Although the initial breach occurred in Context AI, the attackers used that foothold to move into Vercel. The real impact was felt at Vercel because it held valuable customer environments, credentials, and infrastructure access. In supply chain attacks, the first compromised system is often not the end goal. Attackers look for pathways into larger, more valuable targets. In this case, Context AI acted as the entry point, but Vercel was the ultimate objective due to its scale and access to customer data. This is why organisations must assess not only their own security posture but also the security of every connected vendor.
How do OAuth tokens increase security risk?
OAuth tokens are designed for convenience. They allow users to grant applications access without sharing passwords. However, this convenience comes with trade-offs. If an attacker gains access to a valid OAuth token, they can impersonate the user without triggering typical authentication checks. Unlike passwords, tokens are often long-lived and may not require frequent revalidation. This makes them attractive targets.
The risk increases further when tokens have broad permissions. For example, access to email, cloud storage, or internal tools can provide attackers with enough control to move laterally across systems. Without proper monitoring and token lifecycle management, these access paths can remain active for extended periods without detection.
What immediate steps should organisations take after a similar breach?
A fast and structured response is critical to limit damage. Organisations should begin by revoking compromised sessions and rotating all exposed credentials, including API keys and database access tokens. Next, review all third-party integrations and disable any that are not essential. This reduces the risk of further exploitation through connected applications. Finally, communicate clearly with affected stakeholders. Transparency helps maintain trust while ensuring that users take necessary precautions on their end.
How can enterprises reduce SaaS supply chain risks in the long term?
Reducing SaaS supply chain risk requires a shift from reactive to proactive security practices. It starts with visibility. Organisations must maintain a clear inventory of all connected applications and their access levels. From there, enforcing least-privilege access is essential. Applications should only have permissions that are strictly necessary for their function. This limits the blast radius if one integration is compromised. Ultimately, SaaS security is about managing trust carefully. Every integration should be treated as a potential risk until proven otherwise.



