A breach at web infrastructure provider Vercel is forcing encryption teams to rotate API keys and conduct a deep inspection of their underlying code.
In a bulletin, Vercel said the hacker was able to capture behind-the-scenes settings that were not locked, potentially exposing API keys – the digital credentials that apps use to connect to other services. Those credentials act as digital passwords, allowing the software to connect to databases, crypto wallets, and external services. In the wrong hands, they can be used to impersonate an application, exceed usage limits, or manipulate its execution.
A post on the cybercrime forum BreachForums claimed to be selling Vercel data for $2 million, including access keys and source code, although those claims have not been independently verified. Vercel said it has hired incident response companies and law enforcement and continues to investigate whether any data was lost.
The company traced the intrusion to Context.ai, a third-party AI tool used by an employee, its CEO said in an X post, where a compromised Google Workspace connection allowed attackers to escalate access to Vercel’s internal environments. Vercel said that environment variables marked “sensitive” are stored in a way that prevents them from being read and that there is no evidence that they have been accessed.
The incident is coming under scrutiny because Vercel underpins the frontend infrastructure for many cryptographic applications and is the primary administrator for Next.js, one of the most widely used web development frameworks. Many Web3 teams host decentralized wallet interfaces and application dashboards on Vercel, relying on environment variables to store credentials that connect their interfaces to blockchain data providers and backend services.
Orca, the Solana-based decentralized exchange, said its interface is hosted on Vercel and that it has rotated all deployment credentials as a precaution. The project added that its on-chain protocol and user funds were not affected.




