The Context AI → Vercel breach stole API keys, source code, and database contents from hundreds of customer organizations. Most coverage focuses on web infrastructure. We pulled NowSecure MARI and looked at the mobile side — binaries already on real phones that hardcode or call *.vercel.app endpoints. What we found is a supply-chain problem that can't be rotated in a git push.
Context AI got phished in March. The attacker rode OAuth into a Vercel employee's Google account, pulled internal creds, and exfil'd customer data. For mobile teams, the breach doesn't stop at Vercel's perimeter — it rides shared SDKs and vendor config endpoints into apps that shipped months ago.
knotapi.vercel.app and its dev/sandbox/switcher variants appear inside Venmo, PayPal, Cash App, Chime, Klarna, Cleo, Bilt Rewards, OnePay, Current, and Lyft Direct. One compromised Vercel surface → ten regulated financial apps asking incident-response questions at once.
shopify-customer-accounts.vercel.app and tapcart-consumer-sandbox.vercel.app appear across Dressbarn, edikted, Alphalete, World of Books, Livingood Daily, and Vapor95 — one SaaS surface, many consumer apps downstream.
A surprising share of embedded hostnames aren't production at all — they're Vercel preview, demo, or v0-scaffold URLs that a build process forgot to swap. That's a release-process bug independent of today's breach. Today, it's also an open door.
Count of mobile-app observations per Vercel hostname. The top five are shared upstream surfaces — not one-off deployments.
Pulled from NowSecure MARI. Filter by app, hostname, or package. Scope tags indicate where the endpoint was observed in the binary or at runtime.
*.vercel.app.Hardcoded URLs, network traffic, pinned certs. Include every third-party SDK — that's where the surprises live. MARI customers: the saved query is in your workspace.
If any of your SDKs or vendors deploys on Vercel, ask them: were you in the blast radius, what did you rotate, which of our tokens did you hold? Ask for the rotation log, not a reassurance.
A v0-*, *-git-*, or *-dev-*.vercel.app inside a signed release is a hygiene bug independent of this breach. Fix it before the next one.
We continuously analyze the apps your org publishes — and the ones your users trust you with. If you want to know which third-party clouds your mobile binaries actually touch, we'll run the query.
Talk to NowSecure → Explore MARI