Skip to content

Vercel April 2026 security incident

We’ve identified a security incident that involved unauthorized access to certain internal Vercel systems.

Security Team
3 min read
Last updated April 21, 2026

We’ve identified a security incident that involved unauthorized access to certain internal Vercel systems. We are actively investigating, and we have engaged incident response experts to help investigate and remediate. We have notified law enforcement and will update this page as the investigation progresses.

In this bulletin:

DateUpdate
April 20, 5:32 PM PSTValidated npm packages are not compromised, added guidance for multi-factor authentication, shipped product enhancements.
April 20, 10:59 AM PSTFurther clarified the definition of compromised credentials and added new Recommendations.
April 19, 6:01 PM PSTWe published information about the origin of the attack and added new Recommendations.
April 19, 11:04 AM PSTWe published an IOC to support the wider community in the investigation and vetting of potential malicious activity in their environments.

Initially we identified a limited subset of customers whose non-sensitive environment variables stored on Vercel (those that decrypt to plaintext) were compromised. We reached out to that subset and recommended an immediate rotation of credentials.

We continue to investigate whether and what data was exfiltrated and we will contact customers if we discover further evidence of compromise. We’ve deployed extensive protection measures and monitoring. Our services remain operational.

The incident originated with a compromise of Context.ai, a third-party AI tool used by a Vercel employee. The attacker used that access to take over the employee's Vercel Google Workspace account, which enabled them to gain access to some Vercel environments and environment variables that were not marked as “sensitive.”

Environment variables marked as "sensitive" in Vercel are stored in a manner that prevents them from being read, and we currently do not have evidence that those values were accessed.

We assess the attacker as highly sophisticated based on their operational velocity and detailed understanding of Vercel's systems. We are working with Mandiant, additional cybersecurity firms, industry peers, and law enforcement. We have also engaged Context.ai directly to understand the full scope of the underlying compromise.

In collaboration with GitHub, Microsoft, npm, and Socket, our security team has confirmed that no npm packages published by Vercel have been compromised. There is no evidence of tampering, and we believe the supply chain remains safe.

While we continue to take actions to protect Vercel systems and customers, here are best practices you should follow:

Add an additional layer of security by requiring at least two methods of authentication. Learn more in our 2FA documentation.

Deleting your Vercel projects or account is not sufficient to eliminate risk. Compromised secrets may still provide access to production systems, so you must rotate them before deleting your projects or account.

  • Review and rotate environment variables that were not marked as “sensitive.” Those values (API keys, tokens, database credentials, signing keys, etc.) should be treated as potentially exposed and rotated as a priority.
  • Take advantage of the sensitive environment variables feature so that secret values are protected from being read in the future.

For help rotating your secrets or other technical support, contact us through vercel.com/help.

Our investigation has revealed that the incident originated from a small, third-party AI tool whose Google Workspace OAuth app was the subject of a broader compromise, potentially affecting its hundreds of users across many organizations.

We are publishing the following IOC to support the wider community in the investigation and vetting of potential malicious activity in their environments. We recommend that Google Workspace Administrators and Google Account owners check for usage of this app immediately.

OAuth App: 110671459871-30f1spbu0hptbs60cb4vsmv79i7bbvqj.apps.googleusercontent.com

Our teams are actively shipping updates designed to help you strengthen your security posture.

  • Environment variable creation defaults to sensitive: on
  • Improved team-wide management of environment variables
  • Easier to use activity log, including deep-linking to filtered views and higher information density
  • Clearer team invite emails

Was this helpful?

supported.