Six days after Vercel disclosed an April 18-19 security incident, the company's status page still shows green and its bulletin has not been updated since the disclosure week. The paper's Friday Day 6 read framed the silence as Cursor-deal-absorbed; Saturday extends that frame, with one substantive addition. Push Security's April 23 writeup — and a follow-up by SpecterOps — reconstructed the attack path: a Vercel employee at downstream SaaS provider Context.ai installed Roblox auto-farm cheats containing the Lumma infostealer; browser credentials, Supabase keys, Datadog tokens, and Authkit credentials were exfiltrated; an attacker used a stolen OAuth token to enter Vercel's Google Workspace, then moved laterally into customer environment-variable stores. [1][2]
That sequence is now the canonical supply-chain-via-OAuth case study. The threat actor, claiming the ShinyHunters identity, posted samples on BreachForums and demanded $2 million in Bitcoin. [3] Vercel has confirmed the third-party AI tool vector but has not named Context.ai in its own communications.
Day 6 of silence is the operational artifact. Customers learning from third-party security researchers what their own platform's incident was — while the platform's bulletin holds at "no updates" — is not how disclosure cycles in 2024 ran. The architecture has changed because the attack path has changed: BYOD developer machines, OAuth grants the security team never saw, and a sub-vendor whose Roblox download became a $2 million ransom demand. The platform layer is the bystander.
-- THEO KAPLAN, San Francisco