{"id":25290,"date":"2026-04-13T13:16:29","date_gmt":"2026-04-13T04:16:29","guid":{"rendered":"https:\/\/aireviewirush.com\/?p=25290"},"modified":"2026-04-13T13:16:30","modified_gmt":"2026-04-13T04:16:30","slug":"openai-pulls-the-plug-on-macos-signatures-following-a-provide-chain-incident","status":"publish","type":"post","link":"https:\/\/aireviewirush.com\/?p=25290","title":{"rendered":"OpenAI Pulls the Plug on macOS Signatures Following a Provide Chain Incident"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p data-start=\"9649\" data-end=\"10254\">Not each safety incident begins with stolen buyer information. Generally, a compromised belief mannequin is sufficient to trigger issues. OpenAI\u2019s newest announcement falls squarely into this class: The corporate has disclosed a safety incident involving the developer instrument Axios and is now responding with measures associated to the signing of its macOS purposes. At first look, this appears like an administrative matter. In actuality, it touches on the query of how credible a desktop app can nonetheless be acknowledged as \u201creal\u201d if the signing path has been compromised.<\/p>\n<p data-start=\"9649\" data-end=\"10254\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-315169\" src=\"https:\/\/www.igorslab.de\/wp-content\/uploads\/2026\/04\/c1085e32-44dd-445f-bbb5-03f727146adb-980x980.jpg\" alt=\"\" width=\"980\" height=\"980\" srcset=\"https:\/\/www.igorslab.de\/wp-content\/uploads\/2026\/04\/c1085e32-44dd-445f-bbb5-03f727146adb-980x980.jpg 980w, https:\/\/www.igorslab.de\/wp-content\/uploads\/2026\/04\/c1085e32-44dd-445f-bbb5-03f727146adb-300x300.jpg 300w, https:\/\/www.igorslab.de\/wp-content\/uploads\/2026\/04\/c1085e32-44dd-445f-bbb5-03f727146adb-150x150.jpg 150w, https:\/\/www.igorslab.de\/wp-content\/uploads\/2026\/04\/c1085e32-44dd-445f-bbb5-03f727146adb-768x768.jpg 768w, https:\/\/www.igorslab.de\/wp-content\/uploads\/2026\/04\/c1085e32-44dd-445f-bbb5-03f727146adb-414x414.jpg 414w, https:\/\/www.igorslab.de\/wp-content\/uploads\/2026\/04\/c1085e32-44dd-445f-bbb5-03f727146adb-990x990.jpg 990w, https:\/\/www.igorslab.de\/wp-content\/uploads\/2026\/04\/c1085e32-44dd-445f-bbb5-03f727146adb.jpg 1024w\" sizes=\"auto, (max-width: 980px) 100vw, 980px\"><\/p>\n<p data-start=\"10293\" data-end=\"10830\">OpenAI explains that on March 31, 2026, as half of a bigger software program provide chain assault, a compromised model of the broadly used Axios library made its manner right into a GitHub Actions workflow used within the macOS app signing course of. In keeping with OpenAI, this workflow downloaded and executed the manipulated Axios model 1.14.1. The workflow had entry to certificates and notarization supplies used to signal ChatGPT Desktop, Codex, Codex-cli, and Atlas. It is very important clearly distinguish between potential danger and confirmed harm. OpenAI explicitly emphasizes that it has discovered no proof that person information was accessed, that methods or mental property had been compromised, or that the software program itself was altered. On the identical time, as a precautionary measure, the corporate is treating the signature certificates current within the workflow as compromised, revoking and rotating it, releasing new builds of the affected merchandise, and dealing with Apple to make sure that no new notarizations are attainable with the outdated certificates.<\/p>\n<p data-start=\"11570\" data-end=\"12106\">Reuters provides that OpenAI recommends that every one macOS customers replace to the newest variations of the affected apps. Older variations of the macOS desktop apps will not obtain updates or assist beginning Might 8 and will not operate. Reuters additionally studies, citing OpenAI, that passwords and API keys weren&#8217;t affected and {that a} misconfiguration within the GitHub Actions workflow was recognized because the trigger and has been fastened. That is exactly the place the true lesson lies. As issues stand, this isn&#8217;t a traditional information breach, however a supply-chain incident in a very delicate a part of the chain of belief. Those that distribute macOS apps depend on signatures and notarization to operate as credible proofs of origin. If this path is even probably compromised, the harm just isn&#8217;t routinely a knowledge leak, however initially a belief situation with very sensible penalties: customers should replace, outdated builds are taken offline, and the producer should visibly rebuild its total chain of legitimacy. This classification follows from the measures described by OpenAI.<\/p>\n<p data-start=\"12852\" data-end=\"13321\">Additionally it is noteworthy how assertively OpenAI is phrasing issues this time. The corporate just isn&#8217;t making an attempt to brush the matter beneath the rug, however is naming the affected course of, the merchandise, and the precise countermeasures. That is refreshingly matter-of-fact. And certain vital, too, as a result of particularly with desktop software program, a signature situation is much extra problematic than the same old PR boilerplate about \u201cinfrastructure up to date as a precaution.\u201d\u00a0This isn\u2019t a catastrophe report, however it\u2019s a really instructive one. It reveals how shortly a third-party bundle compromise can change into an issue in a single\u2019s personal chain of belief. Anybody who nonetheless believes in 2026 that provide chain safety is only a matter for summary developer blogs is in for a moderately vivid actuality test.<\/p>\n<div id=\"igorslab-1052195571\" data-igorslab-trackid=\"275905\" data-igorslab-trackbid=\"1\" data-igorslab-redirect=\"1\" class=\"igorslab-target igorslab-target\"><a data-bid=\"1\" data-no-instant=\"1\" href=\"https:\/\/www.igorslab.de\/linkout\/275905\" rel=\"noopener\" class=\"notrack\" target=\"_blank\" aria-label=\"Duronaut_Banner_IL\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.igorslab.de\/wp-content\/uploads\/2025\/03\/Duronaut_Banner_IL.png\" alt=\"\" srcset=\"https:\/\/www.igorslab.de\/wp-content\/uploads\/2025\/03\/Duronaut_Banner_IL.png 980w, https:\/\/www.igorslab.de\/wp-content\/uploads\/2025\/03\/Duronaut_Banner_IL-300x38.png 300w, https:\/\/www.igorslab.de\/wp-content\/uploads\/2025\/03\/Duronaut_Banner_IL-768x98.png 768w\" sizes=\"(max-width: 980px) 100vw, 980px\" width=\"980\" height=\"125\" style=\" max-width: 100%; height: auto;\"><\/a><\/div>\n<\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Not each safety incident begins with stolen buyer information. Generally, a compromised belief mannequin is sufficient to trigger issues. OpenAI\u2019s newest announcement falls squarely into this class: The corporate has disclosed a safety incident involving the developer instrument Axios and is now responding with measures associated to the signing of its macOS purposes. At first [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":25292,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-25290","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-computer-components"},"_links":{"self":[{"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/posts\/25290","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=25290"}],"version-history":[{"count":1,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/posts\/25290\/revisions"}],"predecessor-version":[{"id":25291,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/posts\/25290\/revisions\/25291"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/media\/25292"}],"wp:attachment":[{"href":"https:\/\/aireviewirush.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=25290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=25290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=25290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}