Third-party AI breaches Vercel; Orca urgently rotates the key and confirms the agreement is secure

ORCA18,87%

Orca key rotation

Decentralized exchange Orca announced on April 20 that it has completed a comprehensive rotation of encryption keys and credentials in response to a security incident involving the cloud development platform Vercel, confirming that its on-chain contracts and users’ funds were not affected. Vercel disclosed on Sunday that the attackers accessed parts of the platform’s internal systems through a third-party AI tool that integrates with Google Workspace OAuth.

Attack Path: An AI OAuth Supply Chain Flaw, Not a Direct Attack on Vercel Itself

Vercel attack incident (Source: Vercel)

The attack path in this incident was not a direct targeting of Vercel, but instead involved a third-party AI tool that had previously been compromised in an earlier, larger-scale security incident. It used its Google Workspace OAuth integration permissions to access Vercel’s internal systems. Vercel said that the tool previously affected hundreds of users across multiple organizations.

This kind of supply chain vulnerability is difficult for traditional security monitoring to detect because it leverages trusted integration services rather than a direct code vulnerability. Developer Theo Browne noted that the most severely affected was the internal Vercel integration with Linear and GitHub. Information the attacker could potentially access includes: access keys, source code, database records, and deployment credentials (including NPM and GitHub tokens). The incident attribution is currently unclear; there have been reports that the seller demanded a ransom from Vercel, but the details of the negotiations were not disclosed.

Unique Risks for Crypto Frontends: Attacks on the Hosting Layer vs. Traditional DNS Hijacking

This incident highlights a long-overlooked attack surface in crypto frontend security:

Key Differences Between the Two Attack Modes

DNS-Layer Hijacking: Attackers redirect users to a spoofed website, which can typically be detected relatively quickly through monitoring tools

Hosting Layer (Build Pipeline) Compromise: Attackers directly modify the frontend code delivered to users. Users visit the correct domain but may unknowingly run malicious code

In the Vercel environment, if environment variables are not marked as “sensitive,” they may be leaked. For crypto protocols, these variables typically contain critical information such as API keys, private RPC endpoints, and deployment credentials. Once leaked, attackers may tamper with deployed versions, inject malicious code, or access backend services to carry out broader attacks. Vercel has urged customers to immediately review environment variables and enable the platform’s sensitive variable protection features.

Implications for Web3 Security: Supply Chain Dependence Is Becoming a Systemic Risk

This incident affects not only Orca but also reveals a deeper structural problem to the entire Web3 community: the growing dependence of crypto projects on centralized cloud infrastructure and AI integration services is creating a new attack surface that is difficult to defend against. When any trusted third-party service is compromised, attackers can bypass traditional security defenses and directly affect users. Crypto frontend security has moved beyond the scope of DNS protection and smart contract audits; comprehensive security governance for cloud platforms, CI/CD pipelines, and AI integrations is becoming an essential defensive layer that Web3 projects cannot ignore.

Frequently Asked Questions

How did this Vercel security incident affect crypto projects that use Vercel?

Vercel said the number of affected customers was limited and that the platform service was not interrupted. However, because many DeFi frontends, DEX interfaces, and wallet connection pages are hosted on Vercel, project teams are advised to immediately review environment variables, rotate any keys that may have been exposed, and confirm the security status of deployment credentials (including NPM and GitHub tokens).

What specific risks does “environment variable leakage” entail in crypto frontends?

Environment variables typically store sensitive information such as API keys, private RPC endpoints, and deployment credentials. If these values leak, attackers could tamper with frontend deployments, inject malicious code (for example, forged wallet authorization requests), or access backend connection services to carry out broader attacks—while the domain the user visits still appears normal on the surface.

Were Orca users’ funds affected by this Vercel incident?

Orca has explicitly confirmed that its on-chain contracts and users’ funds were not affected. This key rotation was carried out as a precautionary measure out of caution, not based on any confirmed loss of funds. Because Orca uses a non-custodial architecture, even if the frontend is affected, ownership and control of on-chain assets remain with the users themselves.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Scallop Protocol on Sui Hit by Flash Loan Attack, $142K Drained via Oracle Manipulation

Gate News message, April 26 — Scallop Protocol, a lending platform on the Sui blockchain, suffered a flash loan exploit targeting a deprecated side contract linked to its sSUI rewards pool, resulting in a loss of approximately $142,000 (150,000 SUI). The attack exploited oracle price feed

GateNews1h ago

22-Year-Old Sentenced to 70 Months for $263 Million Crypto Theft Money Laundering

California resident Evan Tangeman, 22, was sentenced on Friday to 70 months in federal prison for his role laundering proceeds from a multi-state cryptocurrency theft ring that stole approximately $263 million in digital assets from victims, according to the U.S. Department of Justice. U.S.

CryptoFrontier3h ago

Litecoin Suffers Deep Chain Reorganization After MWEB Privacy Layer Zero-Day Exploit

Gate News message, April 26 — Litecoin underwent a deep chain reorganization on Saturday afternoon after attackers exploited a zero-day vulnerability in its MimbleWimble Extension Block (MWEB) privacy layer, according

GateNews3h ago

Address Linked to Avi Eisenberg Shows New On-Chain Activity, Raising Security Concerns

Gate News message, April 26 — Blockchain analytics platform Arkham has identified renewed on-chain activity from an address believed to be connected to Avi Eisenberg, the attacker who profited approximately $110 million from the 2022 Mango Markets exploit. Eisenberg was previously sentenced to

GateNews5h ago

Sui DeFi lending protocol Scallop is hacked, with a vulnerability in the old contract leading to 150k SUI stolen

Scallop was attacked on the Sui chain, and the side contract involved led to the sSUI rewards pool being exploited. Approximately 150k SUI were stolen. The core contract is secure, and deposits and withdrawals have been restored. The official statement applies only to the deprecated rewards contract; users’ funds were not affected. Former NEAR developer Vadim said the vulnerability originated from an outdated V2 package from 17 months ago, where not initializing last_index caused rewards to accumulate starting in 2023. The fix requires adding a version field to the shared object and strengthening version checks to prevent risks caused by outdated packages.

ChainNewsAbmedia5h ago

Scallop Discovers sSUI Reward Pool Vulnerability, Suffers 150K SUI Loss but Pledges Full Reimbursement

Gate News message, April 26 — Scallop, a lending protocol in the Sui ecosystem, announced the discovery of a vulnerability in an auxiliary contract associated with its sSUI reward pool, resulting in a loss of approximately 150,000 SUI. The affected contract has been frozen, and Scallop confirmed

GateNews10h ago
Comment
0/400
No comments