CodeRabbit logoCodeRabbit logo
AgentEnterpriseCustomersPricingBlog
Resources
  • Docs
  • Trust Center
  • Contact Us
  • FAQ
  • Reports & Guides
Log InGet a free trial
CodeRabbit logoCodeRabbit logo

Products

AgentPull Request ReviewsIDE ReviewsCLI ReviewsPlanOSS

Navigation

About UsFeaturesFAQSystem StatusCareersDPAStartup ProgramVulnerability Disclosure

Resources

BlogDocsChangelogCase StudiesTrust CenterBrand GuidelinesReports & Guides

Contact

SupportSalesPricingPartnerships

By signing up you agree to our Terms of Use and Privacy Policy

discord iconx iconlinkedin iconrss icon
footer-logo shape
Terms of Service Privacy Policy

CodeRabbit Inc © 2026

CodeRabbit logoCodeRabbit logo

Products

AgentPull Request ReviewsIDE ReviewsCLI ReviewsPlanOSS

Navigation

About UsFeaturesFAQSystem StatusCareersDPAStartup ProgramVulnerability Disclosure

Resources

BlogDocsChangelogCase StudiesTrust CenterBrand GuidelinesReports & Guides

Contact

SupportSalesPricingPartnerships

By signing up you agree to our Terms of Use and Privacy Policy

discord iconx iconlinkedin iconrss icon

What the Vercel breach means for enterprise code security

by
Sehtej Khehra

Sehtej Khehra

April 24, 2026

6 min read

April 24, 2026

6 min read

  • What the Vercel breach taught us, and how CodeRabbit is built to address it
    • Lesson 1: Every tool that touches your code is part of the attack surface
    • Lesson 2: Long-lived secrets in code are a major risk
    • Lesson 3: Identity and access controls must extend to the code review layer
  • Questions enterprise security teams should ask vendors selling developer tools
  • At CodeRabbit, security is our top priority
Back to blog
Cover image

Share

https://victorious-bubble-f69a016683.media.strapiapp.com/Reddit_feecae8a6d.pnghttps://victorious-bubble-f69a016683.media.strapiapp.com/X_721afca608.pnghttps://victorious-bubble-f69a016683.media.strapiapp.com/Linked_In_a3d8c65f20.png

Cut code review time & bugs by 50%

Most installed AI app on GitHub and GitLab

Free 14-day trial

Get Started

Catch the latest, right in your inbox.

Add us your feed.RSS feed icon
newsletter decoration

Catch the latest, right in your inbox.

Add us your feed.RSS feed icon

Keep reading

What changed in OpenAI GPT-5.5: Better judgment, stronger coding, better signal

What changed in OpenAI GPT-5.5: Better judgment, stronger coding, better signal

GPT-5.5 benchmark results from CodeRabbit show improved code review precision, higher signal, and better performance in real workflows.

Your AI agent has amnesia

Your AI agent has amnesia

Fifty years of SDLC evolution pushed engineering toward shared understanding. Coding agents reversed the trend in 18 months.

The IDE is no longer the center of software development

The IDE is no longer the center of software development

The IDE is no longer the center of software development. Learn how AI powered operational interfaces like CodeRabbit’s Agent for Slack are transforming engineering workflows, reducing context switching, and redefining developer productivity.

Get
Started in
2 clicks.

No credit card needed

Your browser does not support the video.
Install in VS Code
Your browser does not support the video.

Just days ago, Vercel, a widely used cloud platform for deploying web applications, disclosed a breach that began months earlier. It started in a roundabout way, when a Context.ai employee unwittingly installed a Lumma Stealer disguised as a Roblox script.

A Vercel employee, using Context.ai, then unwittingly got caught up in this trap. The attackers harvested the Vercel employee’s Google Workspace credentials via stolen OAuth tokens, then moved laterally and breached Vercel's internal systems. This exposed API keys, tokens, database credentials, signing keys, and more. In response, Vercel advised customers to rotate any environment variable not marked "sensitive" and to treat those values as compromised.

The inevitable post-mortems of this hack will focus on OAuth governance and third-party SaaS risk. Those angles are valid, but they miss the point for security leaders responsible for the code itself: This was a developer supply chain attack, and the stolen assets prove it.

What the Vercel breach taught us, and how CodeRabbit is built to address it

Our customers trust us with their most valuable asset, their source code. That trust is why security isn't an afterthought. It's a CodeRabbit design principle.

Lesson 1: Every tool that touches your code is part of the attack surface

The right question isn't whether a component in your developer stack gets breached. The better question is, what's the maximum damage an attacker can do from that point?

CodeRabbit Architecture diagram detailing Handler, Reviewer, Database, Scanner, Token Service, and Audit Vault components.

We built the CodeRabbit code-review platform around that question. Every code review runs in an isolated, ephemeral sandbox and is provisioned per event and destroyed after completion. Each sandbox holds a single, short-lived token scoped only to the repository under review. There’s no shared state between customers. There are no long-lived credentials. There’s no access to internal networks.

Sandboxes can reach the public internet when tools require it, but cannot reach CodeRabbit's internal services. Stored code is encrypted with per-customer keys, inaccessible even to CodeRabbit employees.

The result is this: If a sandbox is compromised, there's nothing to pivot to. There’s no persistent tokens, and no lateral movement paths.

If one of your sandboxes or workers is breached tomorrow, what's the worst-case outcome? Every enterprise should ask this of every vendor in their developer stack.

Lesson 2: Long-lived secrets in code are a major risk

Many Vercel customers had to rotate keys they didn't know were exposed because the most damaging credentials are often the ones teams forget exist, buried in environment variables or hardcoded directly in source files.

Code review is the last practical checkpoint before a secret becomes permanent. Once a credential is committed to a Git repository, it can't be fully scrubbed. Copies persist in forks, caches, CI logs, and developer machines. The only reliable defense is catching it at the pull request.

CodeRabbit flags hardcoded credentials through a combination of pattern matching and AI-powered contextual analysis that understands data flow. Pattern matching catches formats like sk_live_*, AKIA[A-Z0-9]{16}, ghp_[a-zA-Z0-9]{36}, and variables named *_SECRET, *_KEY, or *_PASSWORD.

We also integrate tools like Semgrep, Checkov, Brakeman, and Betterleaks, with one-click fixes surfaced directly in the pull request. Security teams can define custom checks in natural language via .coderabbit.yaml and enforce them as pre-merge gates. Examples include blocking files that hardcode database DSNs or flagging OAuth scopes broader than read:user.

Vercel has since updated its platform so new environment variables default to sensitive. That's a step in the right direction, but it only covers secrets that make it into environment variables. It doesn't catch credentials hardcoded in source files, feature branches, comments, or config files. The more robust approach: treat every credential as sensitive by default, and enforce that at the code review layer before it ever reaches production.

Lesson 3: Identity and access controls must extend to the code review layer

At its core, the Vercel breach was an identity breach. An OAuth token issued to a third-party app became an attacker's access path. Every tool with OAuth access in your workspace, every CI service running on long-lived GitHub tokens, every AI assistant with read access to a monorepo, each of those is a potential entry point.

Your code review platform deserves the same identity rigor you apply to your identity provider.

For CodeRabbit Enterprise, that includes:

  • SSO and SAML support across major identity providers, with enforcement rather than optional bypass
  • Custom RBAC to enforce the principle of least privilege
  • Audit logging for all platform actions and administrative changes
  • Self-hosted deployment options for organizations that require code to remain within their network perimeter
  • Support for multi-organization structures, including subsidiaries and M\&A scenarios
  • SOC 2 Type II compliance, validated annually through independent audit
  • Zero data retention after review completion, with all code disposed of once the review ends
  • Vendor security reviews as a standard part of procurement

The goal is straightforward. Even if something upstream is breached, your code review tool should never be the next entry point in the attack chain.

Questions enterprise security teams should ask vendors selling developer tools

The Vercel breach is a reminder to reassess every tool that touches your codebase. Ask these questions of any vendor with access to your source code, including us:

  1. Sandbox isolation: Is it per-event, per-customer, or shared? What's the worst-case outcome if one sandbox is compromised?
  2. Token scope and lifetime: Are tokens short-lived and repo-scoped, or long-lived service credentials?
  3. Encryption at rest: Is code encrypted with per-customer keys? Can your own employees read stored customer code?
  4. Data retention: Is code disposed of after review, or cached indefinitely?
  5. Self-hosted option: Can organizations that can't send source code to an external SaaS deploy on their own infrastructure?
  6. SOC 2 and pen testing: When was your last third-party security assessment, and is the report available under NDA?
  7. Vulnerability Disclosure Program: Do you have one, and how have you responded when a researcher reported a finding?
  8. Sub-processors: What third parties handle your data, is the list public, and how much notice do you give before adding a new one?
  9. Identity controls: Do you offer SSO enforcement, SAML, SCIM, RBAC, and audit log export to a SIEM?
  10. Breach response: How will you notify customers, how quickly, and what will you disclose?

CodeRabbit's answers are detailed in our full security architecture, and in our Trust Center. Our team is also happy to answer any questions.

At CodeRabbit, security is our top priority

Supply chain attacks don't start at the primary target. They start at the weakest link. Every vendor in your developer workflow, every tool with a token, an OAuth grant, or read access to your code is a potential entry point. The Vercel breach didn't begin at Vercel. It began with a Roblox script.

Demand answers. Every vendor you trust with your source code should be able to tell you exactly what happens if they're the next Vercel.