
TL;DR
OpenAI's May 8 macOS certificate rotation for ChatGPT, Codex, Codex CLI, and Atlas is not just a one-off update. It is a useful test of how your team governs AI developer tools.
Read next
Codex runs in a sandbox, reads your TypeScript repo, and submits PRs. Here is how to use it and how it compares to Claude Code.
5 min readOpenAI's April 2026 Codex changelog shows a clear product shift: Codex is becoming a full agent workspace with goals, browser verification, automatic approval reviews, plugins, and tighter permission profiles.
9 min readA practical security playbook for running Codex cloud tasks safely in 2026 using OpenAI docs: internet access controls, domain allowlists, HTTP method limits, and review workflows.
10 min readOpenAI's latest macOS security notice looks, at first glance, like a normal "please update your app" banner. It is more useful than that. The May 8, 2026 deadline is a practical runbook test for every team that now treats AI coding tools as part of the developer workstation.
The short version: OpenAI says a GitHub Actions workflow used in its macOS app-signing process downloaded and executed a malicious Axios package during the March 31, 2026 supply-chain incident. The workflow had access to certificate and notarization material used for ChatGPT Desktop, Codex, Codex CLI, and Atlas. OpenAI says it found no evidence that user data, internal systems, intellectual property, published software, or the certificate itself were compromised, but it is rotating the certificate anyway.
That is the right boring move. Treat the material as exposed, rotate it, ship new builds, and force the old line to die on a calendar date.
For Developers Digest readers, the interesting part is not "Axios was compromised." The interesting part is what this says about Codex, Claude Code, Cursor, Copilot, and every other agent that now sits close to source code, terminals, secrets, browsers, and internal repos. The agent is not just an app. It is a privileged developer surface.
OpenAI says macOS users need to update by May 8, 2026. After that date, older macOS builds signed with the previous certificate will no longer receive updates or support and may stop functioning. The first versions signed with the updated certificate are:
| Product | Earliest supported version |
|---|---|
| ChatGPT Desktop | 1.2026.051 |
| Codex App | 26.406.40811 |
| Codex CLI | 0.119.0 |
| Atlas | 1.2026.84.2 |
This does not affect iOS, Android, Linux, Windows, or web versions according to OpenAI. It is specifically about macOS app signing and notarization.
The right user action is simple: update through the in-app updater or official OpenAI download pages. Do not install OpenAI, ChatGPT, Codex, or Atlas builds from email links, ads, file-sharing links, random mirrors, or third-party download pages.
The right team action is slightly broader: treat this as a drill.
Classic developer-tool updates were annoying but usually narrow. Your editor updated. Your terminal updated. Your package manager updated. You checked that it still launched and moved on.
AI coding tools have a larger blast radius. A local agent can read files, edit code, run shell commands, call MCP servers, use browser sessions, and sometimes touch cloud runners. That does not make the tools bad. It means they deserve the same operational treatment you would give any privileged engineering surface.
If you already read the Codex April changelog, this direction is obvious. Codex is becoming more stateful, more integrated, and more capable. That is useful. It also means update hygiene becomes part of agent governance.
The mistake is turning this into panic. OpenAI's notice is careful: it says there is no evidence of user-data compromise, software alteration, or misuse of the signing material. The better take is operational: this is what mature incident response around an AI developer tool should look like, and it gives teams a concrete checklist to copy.
Get the weekly deep dive
Tutorials on Claude Code, AI agents, and dev tools - delivered free every week.
From the archive
For solo developers, update the apps and move on. For teams, write the one-page runbook now.
The key is step 6. Version numbers are table stakes. Permission mapping is the real maturity test.
If a developer's Codex app can reach production repos, GitHub tokens, local .env files, and browser sessions, you need to know that before the next incident. This is the same lesson behind the agent reliability cliff: serious agent workflows fail at the surrounding control loop before they fail at model intelligence.
There is a reasonable skeptical take here: OpenAI says it found no evidence that the certificate was exfiltrated or misused. It also says published software was not modified. So why make everyone update?
Because signing material is not a normal secret. The whole point of a signing certificate is that the operating system and the user can trust that an app came from the named developer. If there is credible exposure in the signing pipeline, the clean answer is rotation. Waiting for public misuse would be worse.
The more interesting critique is that this still depends on users and teams doing the boring part. A company can rotate certificates, publish clean builds, and warn users. If a team has no inventory of AI desktop tools, no version baseline, and no trusted download policy, it still has a gap.
That gap is not specific to OpenAI. It applies to every agent tool that ships fast and sits inside the developer loop.
OpenAI's post is useful because it names concrete remediation steps, not just vague reassurance. The good pattern:
That is the template AI developer-tool companies should use. The best security post is not the one that sounds most dramatic. It is the one that lets a team close tickets without guessing.
This is also where skills as an agent operating system becomes more than a productivity pattern. If your organization uses agent skills, MCP configs, hooks, or local runbooks, the security update process should live there too. The next time a certificate rotation, OAuth scope change, or plugin revocation lands, your agent should know the team's exact update checklist.
For Codex CLI users on macOS, the minimum supported version after the certificate rotation is 0.119.0. If your team installs Codex through the official docs, the check should be simple:
codex --version
Then update through the official route documented by OpenAI. If your team wraps Codex in a dotfiles repo, bootstrap script, MDM profile, or devcontainer setup, update that source of truth too. Otherwise the same outdated version comes back the next time someone rebuilds a laptop.
For the Codex desktop app, open the app and use the built-in update path or download from OpenAI's official page. Treat random "fixed" installers as hostile by default.
The AI coding stack is crossing a line from "tools developers try" into "infrastructure developers depend on." That changes the maintenance model.
The useful response is not to avoid Codex, Claude Code, or local agents. The useful response is to operate them like real engineering systems:
That is less exciting than a new model benchmark. It matters more.
The May 8 Codex and ChatGPT macOS deadline is a small event if you update one laptop. It is a larger signal if you run an engineering team: AI developer tools now deserve the same boring operational discipline as package managers, CI credentials, browser profiles, and deploy keys.
Yes. OpenAI lists Codex CLI 0.119.0 as the earliest version signed with the updated certificate. On May 8, 2026, older macOS builds signed with the previous certificate will no longer receive support and may stop functioning.
OpenAI says it found no evidence that user data, products, internal systems, intellectual property, published software, or passwords/API keys were compromised. The certificate rotation is a precaution after exposure in the macOS app-signing workflow.
OpenAI says the issue only affects macOS apps. It does not affect iOS, Android, Linux, Windows, or web versions.
Use the in-app updater or official OpenAI download/docs links. Avoid installers sent through email, messages, ads, file-sharing links, mirrors, or third-party download sites.
Sources: OpenAI's Axios developer tool compromise response, Axios coverage of the OpenAI macOS signing incident, OpenAI Codex CLI docs.
Technical content at the intersection of AI and development. Building with AI agents, Claude Code, and modern dev tools - then showing you exactly how it works.
OpenAI's cloud coding agent. Runs in a sandboxed container, reads your repo, executes tasks, and submits PRs. Uses GPT-5...
View ToolOpenAI's open-source terminal coding agent built in Rust. Runs locally, reads your repo, edits files, and executes comma...
View ToolOpenAI's flagship. GPT-4o for general use, o3 for reasoning, Codex for coding. 300M+ weekly users. Tasks, agents, web br...
View ToolOpenAI's latest flagship model. Major leap in reasoning, coding, and instruction following over GPT-4o. Powers ChatGPT P...
View ToolOne control panel for Claude Code, Codex, Gemini, Cursor, and 10+ AI coding harnesses. Desktop app for Mac.
Open AppOpenAI Assistants API is sunsetting August 26 2026. Paste your code, get Responses API equivalent. Built for the migration deadline.
Open AppSet up Codex Chronicle on macOS, manage permissions, and understand privacy, security, and troubleshooting.
Getting StartedStep-by-step guide to building an MCP server in TypeScript - from project setup to tool definitions, resource handling, testing, and deployment.
AI Agents
Codex runs in a sandbox, reads your TypeScript repo, and submits PRs. Here is how to use it and how it compares to Claud...

OpenAI's April 2026 Codex changelog shows a clear product shift: Codex is becoming a full agent workspace with goals, br...

A practical security playbook for running Codex cloud tasks safely in 2026 using OpenAI docs: internet access controls,...

The math of agent pipelines is brutal. 85% reliability per step compounds to about 20% at 10 steps. Here is why long cha...

GitHub trending is full of agent skill frameworks. The real shift is not bigger prompts or more agents. It is turning te...

Codex is no longer just a terminal agent. Here is when to use the Codex SDK, Codex CLI, or openai/codex-action, and how...

New tutorials, open-source projects, and deep dives on coding agents - delivered weekly.