The New Grok Times

The news. The narrative. The timeline.

Technology

Vercels OAuth Day Sixteen Silence Becomes Procurement Architecture

Vercel disclosed unauthorized access to its systems on April 19 — sixteen days ago — through compromised OAuth tokens belonging to Context.ai, an AI tool one of its employees used. [1] The Context.ai compromise itself originated in an employee infostealer attack tied to a Roblox cheat search. ShinyHunters listed the data on BreachForums for $2 million the following day; class-action solicitation letters began circulating within the first week. [2]

What Vercel has not produced in the sixteen days since is the architecture. No public OAuth-scope review. No token-storage policy change. No third-party SaaS audit committed to a date. Guillermo Rauch's April 20 update to the community detailed the incident chain but committed only to internal review timelines that have not been published. [3] VentureBeat and Trend Micro have framed the gap in the same words: this is the OAuth gap most security teams cannot detect, scope, or contain. Gergely Orosz's X post translated the lesson for procurement teams: every SaaS tool that needs broad data access — and AI tools "do just this" — is its own security risk that must be onboarded with vendor diligence rather than swept in by an employee credential. [4]

The Tuesday register is the procurement one. Sixteen days of silence on what specific OAuth scopes Context.ai held against Vercel's internal systems, what data classes those scopes touched, and what storage policy now governs those tokens turns the breach into the procurement default. Buyers reading the Vercel timeline will conclude that an OAuth scope granted to a third-party AI tool — and not subsequently reviewed — is the standard the industry has settled into. The Hacker News framing of "OAuth supply-chain attack in the AI era" is now the operating term. [5]

-- THEO KAPLAN, San Francisco

Sources & X Posts

News Sources
[1] https://techcrunch.com/2026/04/20/app-host-vercel-confirms-security-incident-says-customer-data-was-stolen-via-breach-at-context-ai/
[2] https://www.bleepingcomputer.com/news/security/vercel-confirms-breach-as-hackers-claim-to-be-selling-stolen-data/
[3] https://x.com/rauchg/status/2045995362499076169
[4] https://venturebeat.com/security/vercel-breach-exposes-the-oauth-gap-most-security-teams-cannot-detect-scope-or-contain
[5] https://www.trendmicro.com/en_us/research/26/d/vercel-breach-oauth-supply-chain.html
X Posts
[6] The Vercel security breach is a reminder that each and every SaaS tool your team uses IS a security risk of its own - especially if they need broad data access to eg email, internet docs etc (many AI tools do just this) Security teams onboarding new vendors happens for a reason. https://x.com/GergelyOrosz/status/2046001673437319653
[7] This is a textbook OAuth supply-chain attack in the AI era. Tools are powerful, but permission hygiene matters more than ever. Vercel, ContextAI, and the security community are moving fast and transparently. https://x.com/TheHackersNews/status/2046488954472731071

Get the New Grok Times in your inbox

A weekly digest of the stories shaping the timeline — delivered every edition.

No spam. Unsubscribe anytime.