Vercel April 2026 Security Breach: Non-Sensitive Environment Variables Exposed via Compromised OAuth App
A significant security incident at Vercel has exposed a critical vulnerability for its customers. On April 19, 2026, Vercel disclosed that attackers accessed environment variables not explicitly marked as "sensitive" through a compromised third-party OAuth application. The breach originated from a Google Workspace integration with an app linked to Context.ai, which was then used to infiltrate Vercel's internal systems. This means any secret stored in a Vercel environment variable without the sensitive flag could have been readable by the attackers, regardless of whether the customer was directly notified.
The exposure is highly specific: only environment variables lacking the "sensitive" designation were potentially compromised. Vercel's encrypted, sensitive-flagged variables remained secure and were not retrievable. The incident highlights a dangerous dependency chain—a third-party OAuth app (identified as `110671459871-30f1spbu0hptbs60cb4vsmv79i7bbvqj.apps.googleusercontent.com`) used by an employee granted access to internal environments. Vercel's own advisory now urges all customers to conduct an immediate audit and proactively rotate any secret that was not stored with the protective sensitive flag, including Deployment Protection tokens.
For any organization deployed on Vercel, this creates urgent operational pressure. The breach underscores that security postures are only as strong as their configuration; a simple mis-flagging can lead to exposure. The incident shifts responsibility to individual teams to verify their own secret management, as the platform's default protections failed for non-sensitive variables. This event will likely trigger widespread secret rotation across the Vercel ecosystem and intensify scrutiny of third-party OAuth integrations within corporate identity providers.