<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Vordan: The Gap Alert]]></title><description><![CDATA[Real time intelligence on breaking developments in cybersecurity, AI governance, and emerging technology policy. Published when the intelligence warrants it. Short, urgent, and built for practitioners who need to understand what just happened and why it matters before the memo arrives.]]></description><link>https://vordan.substack.com/s/the-gap-alert</link><image><url>https://substackcdn.com/image/fetch/$s_!oN-L!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66e58882-615e-467c-adf7-13aeae28d426_400x400.png</url><title>Vordan: The Gap Alert</title><link>https://vordan.substack.com/s/the-gap-alert</link></image><generator>Substack</generator><lastBuildDate>Mon, 11 May 2026 00:12:05 GMT</lastBuildDate><atom:link href="https://vordan.substack.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Vordan]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[vordan@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[vordan@substack.com]]></itunes:email><itunes:name><![CDATA[Dominick Costa]]></itunes:name></itunes:owner><itunes:author><![CDATA[Dominick Costa]]></itunes:author><googleplay:owner><![CDATA[vordan@substack.com]]></googleplay:owner><googleplay:email><![CDATA[vordan@substack.com]]></googleplay:email><googleplay:author><![CDATA[Dominick Costa]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The Gap Alert | The System Worked. Eight People Died Anyway.]]></title><description><![CDATA[What Tumbler Ridge reveals about the accountability architecture above your AI safety tools.]]></description><link>https://vordan.substack.com/p/the-gap-alert-the-system-worked-eight</link><guid isPermaLink="false">https://vordan.substack.com/p/the-gap-alert-the-system-worked-eight</guid><dc:creator><![CDATA[Dominick Costa]]></dc:creator><pubDate>Fri, 01 May 2026 09:34:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!BRIj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F417ef80a-d8cd-4fc6-aacf-293273215a83_1500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BRIj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F417ef80a-d8cd-4fc6-aacf-293273215a83_1500x500.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BRIj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F417ef80a-d8cd-4fc6-aacf-293273215a83_1500x500.png 424w, https://substackcdn.com/image/fetch/$s_!BRIj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F417ef80a-d8cd-4fc6-aacf-293273215a83_1500x500.png 848w, https://substackcdn.com/image/fetch/$s_!BRIj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F417ef80a-d8cd-4fc6-aacf-293273215a83_1500x500.png 1272w, https://substackcdn.com/image/fetch/$s_!BRIj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F417ef80a-d8cd-4fc6-aacf-293273215a83_1500x500.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BRIj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F417ef80a-d8cd-4fc6-aacf-293273215a83_1500x500.png" width="1456" height="485" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/417ef80a-d8cd-4fc6-aacf-293273215a83_1500x500.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:485,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:178364,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://vordan.substack.com/i/196094058?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F417ef80a-d8cd-4fc6-aacf-293273215a83_1500x500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BRIj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F417ef80a-d8cd-4fc6-aacf-293273215a83_1500x500.png 424w, https://substackcdn.com/image/fetch/$s_!BRIj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F417ef80a-d8cd-4fc6-aacf-293273215a83_1500x500.png 848w, https://substackcdn.com/image/fetch/$s_!BRIj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F417ef80a-d8cd-4fc6-aacf-293273215a83_1500x500.png 1272w, https://substackcdn.com/image/fetch/$s_!BRIj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F417ef80a-d8cd-4fc6-aacf-293273215a83_1500x500.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Eight people are not coming home from Tumbler Ridge, British Columbia.</p><p>Five students. A teacher. A mother. An eleven-year-old boy.</p><p>The system that was supposed to prevent it worked.</p><p>In June 2025, OpenAI&#8217;s automated detection flagged the shooter&#8217;s account for gun violence activity and planning. A specialized safety team reviewed it. They determined the threat was credible and specific. They recommended notifying the RCMP.</p><p>Leadership overruled them.</p><p>The account was deactivated. No report was filed. The stated reason was precedent. Notifying authorities would obligate OpenAI to report every user planning real-world violence. There was also, according to at least one lawsuit filed this week, the matter of an upcoming IPO.</p><p>She opened a second account and kept planning.</p><p>On February 10, 2026, she walked into Tumbler Ridge Secondary School.</p><div><hr></div><p>OpenAI had detection that worked. A safety team that worked.</p><p>What it did not have was a pre-defined escalation path that removed the business calculus from a life-safety decision.</p><p>The recommendation traveled upward and met a judgment call. Made by people weighing precedent and IPO optics while holding a credible threat signal. No documented control that said: when this threshold is crossed, this is what happens, regardless of business consequence. No architecture that made the right response automatic rather than optional.</p><p>Deactivating the account was not governance. It was the appearance of governance. It closed a file without closing the gap. When she opened a second account, there was no structure to catch it because the first response was designed to manage the situation, not prevent the next one.</p><p>That is what the accountability gap looks like when it has a body count.</p><div><hr></div><p>The question every organization deploying AI needs to answer today is not whether your system can flag a threat.</p><p>Tumbler Ridge proves systems can flag threats.</p><p>The question is what happens above the flag.</p><p>Who owns that decision? What is the pre-defined response? Does your architecture remove the business calculus before anyone has an incentive to apply it?</p><p>Or does that decision live in a meeting?</p><p>Accountable by Design means the escalation path exists before the flag fires. The threshold is documented before the threat arrives. The business calculus is removed before the pressure arrives to apply it.</p><p>OpenAI&#8217;s safety team did its job.</p><p>The accountability architecture above it did not exist in any meaningful sense.</p><p>No amount of model improvement, content filtering, or post-incident safeguard strengthening can retroactively build what was never there.</p><div><hr></div><p><em>If your system flagged something critical tonight, what happens next? If the answer involves a meeting, you have a gap.</em></p><p><em>Vordan publishes the Accountability Report every Sunday and the Gap Alert when the intelligence warrants it. Forward this to someone asking the accountability questions before the failure arrives.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://vordan.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Vordan! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Attack Is Already in Progress]]></title><description><![CDATA[The harvest is underway. The governance frameworks meant to stop it have already missed their first deadlines.]]></description><link>https://vordan.substack.com/p/the-attack-is-already-in-progress</link><guid isPermaLink="false">https://vordan.substack.com/p/the-attack-is-already-in-progress</guid><dc:creator><![CDATA[Dominick Costa]]></dc:creator><pubDate>Wed, 29 Apr 2026 13:03:55 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!m8dN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff049d945-0481-4f4b-af78-8c3e3f37aaf2_1500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!m8dN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff049d945-0481-4f4b-af78-8c3e3f37aaf2_1500x500.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!m8dN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff049d945-0481-4f4b-af78-8c3e3f37aaf2_1500x500.png 424w, https://substackcdn.com/image/fetch/$s_!m8dN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff049d945-0481-4f4b-af78-8c3e3f37aaf2_1500x500.png 848w, https://substackcdn.com/image/fetch/$s_!m8dN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff049d945-0481-4f4b-af78-8c3e3f37aaf2_1500x500.png 1272w, https://substackcdn.com/image/fetch/$s_!m8dN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff049d945-0481-4f4b-af78-8c3e3f37aaf2_1500x500.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!m8dN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff049d945-0481-4f4b-af78-8c3e3f37aaf2_1500x500.png" width="1456" height="485" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f049d945-0481-4f4b-af78-8c3e3f37aaf2_1500x500.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:485,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:177424,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://vordan.substack.com/i/195758427?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff049d945-0481-4f4b-af78-8c3e3f37aaf2_1500x500.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!m8dN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff049d945-0481-4f4b-af78-8c3e3f37aaf2_1500x500.png 424w, https://substackcdn.com/image/fetch/$s_!m8dN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff049d945-0481-4f4b-af78-8c3e3f37aaf2_1500x500.png 848w, https://substackcdn.com/image/fetch/$s_!m8dN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff049d945-0481-4f4b-af78-8c3e3f37aaf2_1500x500.png 1272w, https://substackcdn.com/image/fetch/$s_!m8dN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff049d945-0481-4f4b-af78-8c3e3f37aaf2_1500x500.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Somewhere, an adversary is storing your organization&#8217;s encrypted data.</p><p>Not reading it. They cannot do that yet. But they are keeping it. Because in three years, or five, or whenever a quantum machine of sufficient scale comes online, the cryptographic lock on that data becomes a solved problem. Contracts. Health records. Financial transactions. AI training data. Proprietary model weights. Everything your organization marked confidential and transmitted over an encrypted channel becomes readable, retroactively.</p><p>This is harvest now, decrypt later. The attack requires no quantum capability on the adversary&#8217;s side today. It requires patience and storage. Both are cheap. And the window has been open for longer than most governance programs have acknowledged.</p><p>The timeline just got shorter.</p><p>Two papers published this April changed the calculation in ways that matter for risk managers, not just cryptographers. Google revised down the estimated qubit requirements to break 256-bit elliptic curves, which are the cryptographic foundation of most HTTPS connections and public-key identity systems. The attack is now feasible in minutes on superconducting architectures. A separate paper from Oratomic found that a neutral atom system with 26,000 physical qubits could execute a discrete logarithm attack on P-256 in as few as a few days.</p><p>Heather Adkins and Sophie Schmieg at Google set 2029 as their migration deadline in print. That is the first time anyone with that level of technical credibility has put a date that close in public.</p><p>Filippo Valsorda, the maintainer of Go&#8217;s standard library cryptography packages, put the decision frame plainly: &#8220;The bet is not &#8216;are you 100% sure a CRQC will exist in 2030?&#8217; The bet is &#8216;are you 100% sure a CRQC will NOT exist in 2030?&#8217;&#8221;</p><p>If you are responsible for users&#8217; security and cannot answer that question with certainty, the migration is not optional.</p><p>The rules already exist.</p><p>NIST finalized post-quantum cryptographic standards in August 2024. The Quantum Computing Cybersecurity Preparedness Act passed 420 to 3 in the House and unanimously in the Senate. It required OMB to issue migration guidance within one year of those standards. The deadline was August 2025. There is no public evidence it was met. NSM-10 sets a 2035 migration target that survived the administration change intact. The Trump administration&#8217;s June 2025 executive order streamlined the obligations but did not remove them, retaining a hard TLS 1.3 deadline of January 2, 2030.</p><p>The regulatory floor is intact. The enforcement apparatus to activate it is not.</p><p>Here is the accountability problem.</p><p>PQC migration does not fit anyone&#8217;s job description. CISOs own controls, not cryptographic primitive decisions. Compliance teams operate against frameworks like SOC 2, ISO 27001, HIPAA, and PCI-DSS, and none of them contain a post-quantum control. There is no checkbox to fail. Board reporting has no vocabulary for quantum risk. OMB had the mandate, missed the deadline, and faced no visible consequence.</p><p>The result is an organizational accountability vacuum. No internal owner. No auditable control state. Governance tooling that cannot see the exposure because it was never designed to.</p><p>That last point is structural, not accidental. Traditional GRC is built for periodicity. Annual assessments, point-in-time reviews, checklist compliance. Quantum exposure is not a state you are in or out of. It is a continuous property of your entire technology stack, every algorithm in every data pipeline, every TLS certificate, every API key exchange. An annual audit cannot represent that. GRC practitioners are discovering the same structural gap in AI governance right now. AI risk is continuous and probabilistic, not periodic and deterministic. PQC migration has exactly the same property, and none of the tooling being built to close the AI governance gap addresses it.</p><p>The hidden half of the crisis.</p><p>The deployment statistics look more reassuring than they are. Over fifty percent of traffic through Cloudflare&#8217;s global network now uses post-quantum key exchange, based on October 2025 data. Major browsers deploy it by default. Progress is real.</p><p>But key exchange is only half the problem. Digital signatures, the mechanism behind every HTTPS certificate, every code-signing certificate, every X.509 identity chain, have zero post-quantum deployment. Anywhere. As of late 2025, no public post-quantum X.509 certificates exist. The entire WebPKI infrastructure is running on quantum-vulnerable signatures with no deployed replacement. Key exchange progress creates the impression of migration in motion. Signature migration has not started.</p><p>What to do now.</p><p>Map the exposure before someone else does. A cryptographic inventory identifying which systems use which algorithms for what purpose is the precondition for a migration plan. Without it, ownership cannot be assigned and accountability cannot be tracked. This is what QCPA required of federal agencies. It is the right starting point for any organization holding sensitive data with a shelf life longer than three years.</p><p>Insert PQC into vendor risk assessments. The bottleneck is not browsers. It is origin server infrastructure. Only 3.7 percent of origin servers support post-quantum key exchange compared to 39 percent of major websites. Supply chain PQC requirements are already propagating through cloud platform terms of service. Getting ahead of this in vendor contracts and third-party reviews is operationally simpler now than during an enforcement cycle.</p><p>The governance failure, precisely stated.</p><p>The technical community completed its work. NIST ran a seven-year public competition and published standards. Google deployed them at scale. Valsorda is now teaching RSA as a legacy algorithm to PhD students. The path is known, standardized, and partially walked.</p><p>What is missing is accountability. OMB had a clear mandate and missed its first milestone. GRC platforms have no field for quantum exposure. No organization has failed an audit because of it. The regulatory floor exists. The enforcement structure to activate it does not yet.</p><p>The harvest does not wait for governance to catch up. The adversary storing your 2024 traffic today does not need to understand ML-KEM or ML-DSA. They need storage. And storage is cheap.</p><div><hr></div><p><em>Vordan publishes every Sunday and Wednesday. If someone in your network is asking the accountability questions before the failure arrives, forward this to them.</em></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://vordan.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Vordan! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Gap Alert | The OAuth Audit You Haven't Done]]></title><description><![CDATA[What the Vercel breach means for every organization running third-party AI tools.]]></description><link>https://vordan.substack.com/p/the-gap-alert-the-oauth-audit-you</link><guid isPermaLink="false">https://vordan.substack.com/p/the-gap-alert-the-oauth-audit-you</guid><dc:creator><![CDATA[Dominick Costa]]></dc:creator><pubDate>Wed, 22 Apr 2026 13:03:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!oN-L!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66e58882-615e-467c-adf7-13aeae28d426_400x400.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Last weekend, a Vercel employee connected a third-party AI tool called Context.ai to their corporate Google Workspace account. Standard behavior. Happens hundreds of times a day inside organizations everywhere.</p><p>The attacker who had already compromised Context.ai used that OAuth connection to take over the employee&#8217;s Google account, pivot into Vercel&#8217;s internal systems, and access environment variables containing API keys, database credentials, and signing keys across a subset of customers. Mandiant is now investigating. The IOC is published. Hundreds of organizations may be affected through Context.ai&#8217;s broader user base.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://vordan.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Vordan! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The breach wasn&#8217;t sophisticated. It didn&#8217;t require a zero-day or nation-state capability. It required one employee, one AI tool, and one OAuth grant nobody was tracking.</p><p>Here&#8217;s the governance failure in plain language.</p><p>Most organizations have a formal vendor risk review process for enterprise software. Legal reviews the contract. Security reviews the architecture. IT reviews the integration. That process exists because someone learned the hard way that third party access is a liability.</p><p>That process does not exist for the AI tool your developer installed last Tuesday.</p><p>No formal inventory of what OAuth grants exist across your Google Workspace. No review of what permissions those grants carry. No audit of what internal systems they can reach. No policy defining what non-sensitive actually means when an attacker is enumerating your environment variables.</p><p>The tool arrived. The governance didn&#8217;t.</p><p>Three things worth doing this week.</p><p>Go to your Google Workspace admin console and pull a full list of third-party apps with OAuth access. You will find things you didn&#8217;t know were there.</p><p>Review which of those apps have broad permission scopes versus narrow ones. An app that can read your entire Google Drive is a different risk profile than one that can only read your calendar.</p><p>Ask your security team when you last reviewed this list. If the answer is never or I don&#8217;t know, that&#8217;s your gap.</p><p>The Vercel breach is being called a supply chain attack. It is. But it&#8217;s also something more specific and more preventable: an AI tool governance failure at the identity and access layer. That category of failure has no control in most organizations right now.</p><p>The IOC is published at vercel.com/kb/bulletin/vercel-april-2026-security-incident</p><p>If you are on Vercel, rotate your credentials today.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://vordan.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Vordan! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>