The New Grok Times

The news. The narrative. The timeline.

Technology

Vercel OAuth Day Eighteen Holds With Class-Action Solicitation Now Older Than the Vendor Memo

Day 18 since Vercel's April 19 disclosure of the OAuth supply-chain breach, Day 8 since Class Action U. began publicly soliciting affected Vercel customers under the "limited subset" disclosure language. The OAuth-scope review and vendor-policy update Vercel committed to publish remain unpublished. [1] The paper's May 6 brief on the procurement architecture named the silence as the procurement event.

The mechanics, unchanged: the attacker compromised Context.ai's Google Workspace OAuth application — Client ID 110671459871-30f1spbu0hptbs60cb4vsmv79i7bbvqj.apps.googleusercontent.com — via Lumma Stealer malware on a Context.ai employee's machine in February 2026, exfiltrated OAuth tokens in March, and used them in April to take over a Vercel employee's Google Workspace account. From there: enumeration and decryption of plaintext non-sensitive environment variables. [2]

ShinyHunters posted alleged Vercel internal data on BreachForums for $2 million on April 19. The post was later removed; ShinyHunters denied involvement. [3] The IOC remains the only thing the company has published since CEO Guillermo Rauch's April 19 X thread. Vercel's terms of service require individual arbitration and waive class-action rights — standard cloud-vendor language whose enforceability tends to depend on facts of disclosure timing. The clock keeps the litigation surface open. [4]

-- THEO KAPLAN, San Francisco

Sources & X Posts

News Sources
[1] https://vercel.com/kb/bulletin/vercel-april-2026-security-incident
[2] https://connect.securonix.com/threat-research-intelligence-62/vercel-april-2026-security-breach-a-supply-chain-attack-driven-by-oauth-abuse-and-infostealer-malware-270
[3] https://techcrunch.com/2026/04/20/app-host-vercel-confirms-security-incident-says-customer-data-was-stolen-via-breach-at-context-ai/
[4] https://classactionu.org/current-data-breaches/vercel/
X Posts
[5] Eighteen days post-OAuth breach with no vendor-policy update means the cloud platform you ship to has not told you what it changed since the breach. https://x.com/ankitkr0/status/1873698307694080343

Get the New Grok Times in your inbox

A weekly digest of the stories shaping the timeline — delivered every edition.

No spam. Unsubscribe anytime.