Threat Advisory

Vercel Breach April 2026: What We Know So Far (Rotate Credentials Now)

TLT
Threat Landscape Team
2026-04-194 min read

On April 19, 2026, Vercel officially confirmed a Vercel breach involving unauthorized access to certain internal systems. The company's security bulletin states that the incident affected a limited subset of customers, but all services remain fully operational. No details have been released on how the attackers got in, what data was accessed, or exactly which customer accounts were impacted.

Vercel's statement is short and measured:

"We've identified a security incident that involved unauthorized access to certain internal Vercel systems… We are actively investigating, and we have engaged incident response experts to help investigate and remediate. We have notified law enforcement and will update this page as the investigation progresses."

Vercel has since released additional detail on scope, recommendations, and — critically — a published indicator of compromise (IOC).

Who Is Impacted

Vercel states that a limited subset of customers were impacted and are being contacted directly. All Vercel services remain operational. No comprehensive customer list has been made public.

Rumors on X and Breach Forums (Unverified)

Within hours of the Vercel breach announcement, security researchers and X users began sharing claims that internal databases, employee credentials, GitHub tokens, NPM tokens, and customer API keys are allegedly being sold on BreachForums for $2 million by the group ShinyHunters. These reports remain completely unverified by Vercel or any independent source. Until Vercel provides concrete evidence, treat every claim as unverified.

Attack Vector: Compromised Third-Party AI Tool via Google Workspace OAuth

Vercel's investigation has identified the root cause. The incident originated from a small, third-party AI tool whose Google Workspace OAuth app was the subject of a broader compromise. This compromise potentially affects hundreds of users of that tool across many organizations — meaning the blast radius extends well beyond Vercel itself.

This is a supply-chain style attack: an OAuth integration trusted by Vercel's environment was weaponized, granting attackers a foothold into internal systems.

Indicators of Compromise (IOC)

Vercel has published the following IOC to support the wider community. Google Workspace Administrators and Google Account owners should check for usage of this app immediately.

TypeValue
Google Workspace OAuth App ID110671459871-30f1spbu0hptbs60cb4vsmv79i7bbvqj.apps.googleusercontent.com

If this OAuth app is connected to any accounts in your Google Workspace environment, treat it as malicious, revoke its access immediately, and audit activity during the period it was authorized.

Vercel's Official Recommendations

Vercel has issued specific guidance for all customers:

  1. Review your account activity log for suspicious activity — accessible via the Vercel dashboard or CLI.
  2. Review and rotate environment variables. Vercel notes that variables marked as "sensitive" are stored in a way that prevents them from being read, and there is currently no evidence those values were accessed. However, any environment variable containing a secret that was not marked as sensitive — API keys, tokens, database credentials, signing keys — should be treated as potentially exposed and rotated immediately.
  3. Use the sensitive environment variables feature going forward to protect secret values from future exposure.
  4. For help rotating secrets or other technical support, contact Vercel at vercel.com/help.

What You Should Do Right Now

Beyond Vercel's own guidance, here is a prioritised action list:

  • Immediately rotate all non-sensitive environment variables in your Vercel projects — especially API keys, database credentials, and signing keys.
  • Check Google Workspace for the published OAuth App ID and revoke its access if found.
  • Enable Vercel's sensitive environment variable feature wherever possible.
  • Audit your build logs for any previously cached or logged secrets.
  • If you haven't received direct communication from Vercel and are concerned, open a support ticket at vercel.com/help.

Vercel powers a large portion of modern web infrastructure. A single platform compromise can cascade across thousands of production apps. Acting now costs almost nothing; inaction could be costly.

Stay safe out there.

Sources

ThreatLandscape.io is monitoring the Vercel breach closely and will publish a full follow-up as soon as new information emerges.

Ready to Transform Your Threat Intelligence?

See how Threat Landscape can reduce alert fatigue and improve your security operations