Voiceflow named in Gartner’s Innovation Guide for AI Agents as a key AI Agent vendor for customer service
Read now

Between 11:00 AM and 12:00 PM (UTC), our monitoring systems detected abnormal and automated behaviour linked to a malicious dependency used in developer environments.
According to our internal audit logs:
Our internal alerting systems (AWS Guarduty) flagged unusual, automated repository activity consistent with code injection patterns.
The incident was detected within minutes, and our engineering & security teams immediately initiated incident response procedures.
Based on audit logs reviewed across AWS, GitHub, NPM, CircleCI, and Doppler, we confirmed the following that no customer information was leaked and no access to our environment was done.
Within minutes of detection, we executed a full containment and remediation procedure, including:
We immediately revoked and recreated all access tokens associated with affected development accounts:
All suspicious branches were automatically deleted across affected repositories.
All affected services were updated to pin the dependency version and ensure malicious versions cannot be reintroduced.
Developer machines identified as affected were fully wiped and restored from clean baselines.
All packages were re-published without the affected package.
After reviewing all audit logs, traffic logs, package registries, and access patterns, we can confirm:
Voiceflow is implementing additional controls to prevent recurrence:
There is no impact to Voiceflow customers, agents, data, or environments.
All systems remain fully operational, and no customer action is required. If customers would like to update their dependencies, use the latest version of our NPM packages published on November 25th, 2025.
We are sharing this advisory transparently to keep you informed and to demonstrate our commitment to rigorous supply-chain security.