OpenAI Revokes macOS App Certificate After Malicious Axios Supply Chain Incident

Minimalist vector art of a Mac monitor with a red "Revoked" stamp, representing OpenAI's emergency certificate rotation.

OpenAI has taken the drastic step of rotating its developer signing certificates for macOS, forcing a mandatory update for all desktop users after a critical third-party library was linked to state-sponsored malware.

SAN FRANCISCO, CA — OpenAI has confirmed it is rotating the digital certificates used to sign its macOS applications after discovering that a widely used developer tool, Axios, was compromised in a sophisticated supply chain attack. The incident has forced OpenAI to revoke its existing macOS app certificate, rendering older versions of the ChatGPT Mac app unusable and requiring users to download a hardened update immediately.

The move comes as the industry grapples with the fallout of the North Korean-linked supply chain attack via the Axios npm package, which we previously reported on as a major escalation in state-sponsored cyber-espionage.

Ecosystem Impact
macOS Userbase Millions of ChatGPT Mac users must perform a manual or forced update to restore app functionality and clear revoked certificate warnings.
Developer Trust The Axios incident has triggered a wider audit of npm dependencies across the AI software industry to prevent similar "shadow" breaches.
Apple Gatekeeper This event serves as a high-profile test for Apple's certificate revocation system, proving it can effectively neutralize compromised software at scale.
CI/CD Security Organizations are being forced to rethink automated builds that pull "latest" versions of packages without strict checksum verification.

The Root Cause: The Axios npm Poisoning

The security incident stems from the poisoning of a dependency within the Axios developer ecosystem — a popular HTTP client used by millions of applications to communicate with APIs. Threat actors successfully injected malicious code into the npm registry, allowing for arbitrary code execution during the application build process.

While OpenAI maintains that its internal production systems and core user data remain unaffected, the company opted for a " scorched earth" approach to its macOS signatures to ensure no potentially tampered binaries remain active in the wild.

"Out of an abundance of caution, we have revoked the certificate used for previous versions of the ChatGPT app for macOS," an OpenAI spokesperson stated. "Users must update to the latest version to ensure continued protection against third-party library vulnerabilities."

Timeline and Response

Security researchers at The Hacker News and Cybersecurity News noted that the malicious package was specifically designed to target macOS environments, seeking to exfiltrate keychain data and environment variables.

  • April 11: The Axios compromise was identified by secondary security audits.
  • April 12: OpenAI begins a global rollout of a new certificate and an emergency app update.
  • April 13: Older versions of the app trigger macOS "Gatekeeper" warnings, effectively blocking execution for unpatched users.

Industry analysts suggest that OpenAI's quick response was necessitated by the high-profile nature of its user base, which includes C-suite executives and government officials who utilize the Mac app for sensitive AI-assisted workflows.


The CyberSignal Analysis

Signal 01 — The "Certificate Nuke" as Incident Response

Revoking a developer certificate is a disruptive "nuclear option" because it breaks every previous version of the software. OpenAI's decision to do this indicates they believed the risk of a "hidden" backdoor in the Axios-dependent build was high enough to justify the mass user friction of a forced update. For IT leaders, this reinforces that supply chain attacks are no longer peripheral risks — they can invalidate your entire software trust model in hours.

Signal 02 — Target: The Developer Desktop

By targeting Axios, North Korean actors (linked to the Lazarus or Kimsuky groups) successfully bypassed the "front door" of OpenAI and went straight for the tools used to build the software. This highlights a critical need for Vulnerability Management at the build-pipeline level, not just the finished product. If your organization uses npm-based tools, you must audit your lockfiles immediately.


Sources

Type Source
Primary Alert OpenAI: Axios Developer Tool Compromise Notice
Technical Analysis The Hacker News: OpenAI Revokes macOS App Certificate
User Advisory Forbes: OpenAI Security Incident Advisory
Threat Intelligence The Cyber Express: Axios npm Attack Escalating

Read more