OpenAI confirmed on Wednesday, May 14, 2026, that two of its employees had their devices compromised in a software supply chain attack, resulting in the theft of limited credential material from internal source code repositories. The company said it found no evidence that user data, production systems, intellectual property, or software installations were affected.
The attack originated with TanStack, a popular open source library used by developers to build web apps. On Monday, TanStack disclosed that hackers had published 84 malicious versions of its software during a six-minute window. A researcher detected the attack within 20 minutes. The malicious versions contained malware designed to steal credentials from infected computers and self-propagate to other systems.
OpenAI said the two affected employees had access to internal source code repositories, from which “only limited credential material” was taken. Because some of those repositories contained digital certificates used to sign OpenAI’s products, the company said it is rotating those certificates as a precaution — a step that will require macOS users to update the app.
It is not yet clear who is behind the TanStack attack. Investigators have not publicly attributed it, though a group known as TeamPCP has been linked to similar past supply chain hacks. Other recent incidents include a March 2026 attack in which North Korean hackers hijacked Axios, a widely used open source development tool, and a separate May 2026 incident in which Chinese hackers were accused of targeting Windows computers running disc imaging software Daemon Tools.
Supply chain attacks work by compromising shared open source projects rather than individual companies, allowing hackers to potentially reach dozens of targets through a single intrusion. The tactic means that even organizations with strong internal security can be exposed through third-party software dependencies their developers rely on.
Source: TechCrunch