TL;DR: Vercel Breach: What You Need to Know Right Now
The Vercel breach started with a Lumma Stealer infection on a Context.ai employee's personal machine in February 2026. That single infection gave attackers Google Workspace credentials, Supabase keys, Datadog logins, and access to the support@context.ai account. From there, they pivoted into Vercel's internal systems by exploiting Context.ai's Google Workspace OAuth scopes. Once inside Vercel, they enumerated environment variables that were not marked "sensitive" and therefore not encrypted. A limited subset of customers had credentials compromised, and Vercel brought in Mandiant to help with incident response. The rest of this article covers exactly how each step of that attack chain worked, what your startup is exposed to, and the precise checklist you need to run before you go to bed tonight.