OpenAI has decided to replace its code signature certificates for macOS after detecting that a GitHub Actions workflow executed, on March 31, 2026, a compromised version of the Axios library (1.14.1). This workflow had access to the certificates used to sign several OpenAI applications in macOS - including ChatGPT Desktop, Codex, Codex CLI and Atlas - so, although internal research found no evidence of malicious use of the keys, the company has chosen to act "by caution" and rotate and revoke the affected certificates.
What does this mean in practice? The signature certificates serve to ensure that macOS and its security mechanisms recognize an application as legitimate and from its developer. If an attacker got a valid copy of those certificates, he could sign malicious software and make it look like a legitimate OpenAI app. To mitigate this risk, OpenAI is issuing new certificates and, in collaboration with Apple, blocking the possibility of future software being notarized with the previous certificate. According to the company, the old certificate will be completely revoked on 8 May 2026; from that date, macOS could prevent the execution of signed versions with the key withdrawal.

OpenAI worked with an external incident response firm to audit what happened. This investigation found no evidence that the certificates had been exfiltered or used to distribute malicious software, nor did it find signs that data from users, passwords or API keys had been compromised. In addition, the company reviewed the activity of prior notarization and verified that everything signed with this certificate so far was legitimate binaries.
What should users of macOS do? Users will need to update their OpenAI applications to signed versions with the new certificate; OpenAI warns that old versions may no longer work from May 8. The recommendation is to use the integrated updates in the applications or download the installers from the official OpenAI pages and avoid installing executables received by mail, ads or links from unverified third party sites.
The company has also made it clear that the problem is linked to its MacOS applications: its web services and applications for iOS, Android, Windows and Linux were not affected by this incident, according to its statement. OpenAI maintains continuous surveillance and reserves the option of accelerating the revocation of the certificate if it detects suspicious activity related to the old certificate.
The incident is part of a software supply chain commitment campaign that, according to researchers, was attributed to an actor linked to North Korea known as UNC1069. In this case, the attackers reportedly carried out a social engineering operation against a maintainer of the Axios project: they organized a false collaboration meeting by video-lamada that led to the installation of malware in the developer's machine and, with account control, published malicious versions of the package in npm. These versions included a unit that deployed a remote access trojan (RAT) capable of attacking macOS, Windows and Linux, which turned the library engaged into a vector to distribute harmful code to projects that incorporated it.
The attacks on the open source supply chain are not new, but they have gained visibility for their ability to reach hundreds or thousands of projects and end-users through a single unit. This episode again stresses that the commitments do not always come from technical failures, but often start with deceit aimed at people: false invitations, trickery collaborative spaces and calls where the target is persuaded to run software or apparently harmless commands.

What technical and organizational measures help to reduce this risk It is something that many development teams are re-reviewing: applying the principle of minimum privilege in CI / CD pipelines so that workflows do not have unnecessary access to secrets and certificates, often encryption and rotating keys, using signatures and integrity controls in dependencies, requiring strong authentication (such as 2FA) to critical maintenance and monitoring unusual activity in repository and package accounts. GitHub offers guides to harden Actions and mitigate risks in continuous integration environments; in addition, organizations such as CISA publish recommendations to protect the software supply chain that are useful for equipment of all sizes.
For those who want to deepen, OpenAI published a security notice with details of the incident and actions undertaken in its official communiqué. If you are looking for context on how notarization and signature of applications in macOS works, Apple's notarization documentation provides a technical view of why these certificates are critical to system security: Notarizing macOS software. For teams that deploy at GitHub Actions, GitHub's good safety practice guide is a practical reference to reduce the attack surface in the pipelines: Hardening GitHub Actions. And to understand the magnitude and risks of this type of campaign to the supply chain, the CISA agency offers resources and practical guidance: CISA - Supply Chain Security.
The key lesson is double: on the one hand, technical security matters - access control, rotation of secrets and audits - on the other, human security remains the Achilles heel. As long as the teams continue to rely on third-party packages and automated integrations, it is essential to combine technical controls with training and protocols that reduce the likelihood that an invitation or a malicious file will end up opening the door to a large-scale intrusion.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...