OpenAI Rotates macOS Code-Signing Certificates Following Supply Chain Attack

OpenAI has initiated the rotation of macOS code-signing certificates after an incident involving a malicious version of the Axios package executed within a GitHub Actions workflow. This activity formed part of a recent supply chain attack targeting the company's code-signing process.
What happened
During a recent supply chain attack, a GitHub Actions workflow used by OpenAI ran a compromised version of the Axios package, which was malicious. This incident prompted OpenAI to rotate their macOS code-signing certificates to mitigate any potential risk related to code signing. The certificates in question were potentially exposed during the execution of this compromised workflow.
Code-signing certificates are critical for verifying the authenticity and integrity of software, especially on macOS systems. The exposure of such certificates in the context of a supply chain attack is a significant security concern because it could enable attackers to sign malicious code to appear legitimate.
Why it matters
The compromise of code-signing certificates through a supply chain incident illustrates the increasing risks in software development pipelines, particularly those involving third-party dependencies like npm packages. Attackers exploiting these mechanisms can undermine trust in signed software and potentially distribute malware that appears authentic.
For companies like OpenAI, which rely heavily on secure software delivery, a breach affecting code-signing certificates threatens the integrity of their applications. This kind of incident highlights the importance of securing automation workflows and closely monitoring dependencies and certificates tied to production environments.
What security teams should do
Security teams should review their continuous integration and delivery pipelines for any suspicious activity and unexpected execution of potentially compromised dependencies such as Axios. Immediate rotation of impacted certificates is advised when a compromise is detected or suspected.
Additionally, teams should ensure that their code-signing credentials are stored securely and implement strict access controls around their use. Monitoring supply chain components and implementing practices such as dependency auditing and integrating trusted package registries can help reduce risk.
Key technical details
The compromised component was a malicious version of the Axios package, which was executed within a GitHub Actions workflow used by OpenAI. This workflow, responsible for code-signing operations on macOS builds, caused the exposure of OpenAI’s macOS code-signing certificates.
The breach triggered a rotation of these certificates by OpenAI to prevent any misuse in signing malicious macOS software. No additional technical details about the specifics of the malicious code or exploitation techniques were disclosed.
Affected organizations/products
OpenAI’s macOS code-signing certificates were exposed due to the malicious execution of the Axios package within their GitHub Actions pipelines. The exposure affected the workflow responsible for code-signing macOS software in OpenAI’s development process.