Cremit
/incidentsfield log
탐지캠페인유출지패턴LLM사고 사례방법론
↺rss↗cremit.io

incidents.cremit.io

실제 발생한 비인간 식별자(NHI) 크리덴셜 유출 사고를 정리한 인덱스. 운영: Cremit

둘러보기

  • 전체 사고
  • npm 공급망
  • CI/CD 침해
  • 방법론

구독

  • RSS 피드
  • @cremit_io
  • GitHub
// 상태
모니터 가동중
// 빌드
2026-05-20
// 출처
cremit · 서울, 대한민국
// 라이선스
CC BY 4.0

© 2026 Cremit. 출처 표시 시 자유롭게 재사용 가능.

홈/사고/vercel-context-ai-incident-2026
HIGH7.8·confirmed·공개 Apr 19, 2026·3분 분량

Vercel Context.ai Incident: Environment Variables Accessed via Compromised AI Tool (2026)

A third-party AI tool used by a Vercel employee was compromised, leading to Google Workspace takeover and access to non-sensitive environment variables in a subset of customer projects.

↗다음에도 게재: cremit.io/blog

Summary

On April 19, 2026, Vercel disclosed unauthorized access to internal systems that reached environment variables in a subset of customer projects. The attack path did not start at Vercel — it began in a third-party AI productivity tool (Context.ai) used by a Vercel employee, which led to Google Workspace account takeover and downstream access to internal Vercel systems. Variables marked sensitive were not accessed; non-sensitive variables were.

Timeline

  • 2026-04-19 — Vercel publishes its security bulletin confirming unauthorized access.
  • 2026-04-19 — A "ShinyHunters"-branded post appears on BreachForums claiming responsibility; attribution is contested.
  • 2026-04-20 — Vercel begins individually contacting affected customers; remediation guidance published.

Attack Vector

The path Vercel described is short:

  1. Context.ai, a third-party AI tool, was compromised.
  2. The attacker used Context.ai's existing access into the employee's Google Workspace to take over that account.
  3. From inside that identity, the attacker reached Vercel's internal systems.
  4. From there, customer environment variables that were not flagged as sensitive were readable.

The breach never crossed a Vercel product boundary — it crossed an identity boundary. The identity it crossed was a human one that had adopted a third-party AI tool, and the tool inherited the human's access into systems no one had explicitly granted it access to.

Tokens & Credentials Exposed

  • Non-sensitive environment variables in a subset of customer Vercel projects. Vercel's bulletin draws a hard line between variables stored without the Sensitive flag and those with it. The latter were not accessed.
  • In practice, "non-sensitive" is misleading: many teams ship API keys, third-party service tokens, and OAuth credentials as plain environment variables because the sensitive flag is opt-in.
  • Specifically at risk: third-party API keys (Stripe, OpenAI, SendGrid, etc.), database connection strings without the flag, and OAuth client secrets.

Confirmed Impact

Vercel has confirmed the unauthorized access; quantification of affected customers is still being communicated individually. As of disclosure, Vercel has stated there is no evidence that values stored as Sensitive Environment Variables were accessed, and no evidence that production deployments were modified.

Claims of a $2M ransom demand and various actor attribution (ShinyHunters, employee panel compromise theory) remain unverified at the time of indexing.

Mitigation & Lessons

If you operate Vercel projects:

  • Rotate now, in this order: third-party API keys for high-blast-radius vendors (Stripe, payment processors, OAuth client secrets); then platform tokens (GitHub, AWS, GCP); then internal service credentials.
  • Move every credential to a Sensitive Environment Variable going forward. The flag is opt-in for historical reasons; treat it as default.
  • Audit Deployment Protection tokens and rotate them.
  • Review Vercel activity logs for the disclosure window.

The broader pattern — third-party AI tools inheriting human access — applies regardless of platform. Audit which AI productivity tools have OAuth scopes into Workspace, Microsoft 365, or your identity provider.

Cremit Analysis

This incident is a textbook example of two NHI Kill Chain stages we have been documenting. The credentials affected were drifted keys — environment variables that were minted for one purpose and silently accumulated reach across deployments and integrations without anyone reviewing whether the original constraints still held. They were also unattributed: most affected teams cannot, on April 19, point at a given environment variable and say which workload owns it, what its rotation policy is, or what it can reach. That delay between detection and rotation is the campaign's oxygen.

The NHI Severity Index score of 7.8 reflects high blast radius (variables touched cross-platform third-party services), production reachability, and variable privilege levels depending on the leaked credential.

If you run a Vercel project and cannot immediately enumerate which environment variables are sensitive, the rotation playbook is also a fire drill for your inventory. That is exactly the gap Argus was built for.


참고 자료

  1. [1]
    Vercel Security Bulletin — Unauthorized Access Incident
    primary·2026-04-19·vercel.com
  2. [2]
    Vercel confirms breach reached customer environment variables
    reporting·2026-04-20·bleepingcomputer.com

관련 사고

2026-04-22·CRITICAL
Bitwarden CLI Supply Chain Compromise (2026)
2021-04-15·CRITICAL
Codecov Bash Uploader Compromise (2021)
2023-01-04·CRITICAL
CircleCI Session Token Breach (2023)
최종 검토 / 2026-04-25검토자 / ben라이선스 / CC BY 4.0
// 사고 메타데이터
심각도
HIGH7.8
상태
confirmed
공개
2026-04-19
벡터
Third-party AI tool compromise
플랫폼
Vercel
토큰
Environment VariableAPI Key (generic)OAuth Token (generic)
nhi severity index
점수7.8 / 10blast radiuscross-platformreachabilityproduction권한variable
nhi kill chain
Drifted Key↗Unattributed Key↗
지표