📰 Full Story
Vercel, the U.S. cloud platform behind Next.js, disclosed a security incident on April 19–20, 2026 after attackers used a compromised third‑party AI application's Google Workspace OAuth credentials to access internal systems.
The company said a limited subset of customers had credentials exposed after an attacker gained access to Vercel environments and enumerated environment variables that were not flagged as “sensitive.” Vercel published an indicator-of-compromise (OAuth client ID 110671459871-30f1spbu0hptbs60cb4vsmv79i7bbvqj.apps.googleusercontent.com) and said it is working with Google‑owned Mandiant, other cybersecurity firms and law enforcement.
Context.ai — the third‑party AI tool implicated — has acknowledged an earlier March AWS incident and likely OAuth token compromise.
A threat actor claiming to be ShinyHunters posted data for sale and asked about $2 million, but Vercel says its open‑source projects (Next.js, Turbopack) remain safe and that “sensitive” environment variables, which are encrypted at rest, show no evidence of access.
Vercel has contacted impacted customers and urged rotation of unprotected secrets, review of activity logs, and tighter OAuth and environment‑variable protections.








💬 Commentary