VulnerabilitiesCRITICAL

Critical Vulnerability Found in Claude Code After Source Leak

Featured image for Critical Vulnerability Found in Claude Code After Source Leak
SWSecurityWeek
Claude CodeAnthropicAdversa AITypeScriptprompt injection
🎯

Basically, a serious flaw was found in Claude Code that could let hackers steal sensitive information.

Quick Summary

A critical vulnerability in Claude Code was discovered shortly after its source code leak. This flaw could allow attackers to bypass security measures and steal sensitive credentials, posing a significant risk. Developers must act quickly to protect their systems.

What Happened

Anthropic's Claude Code has made headlines for troubling reasons. Just days after the source code was accidentally leaked, a critical vulnerability was identified by Adversa AI. This sequence of events raises significant security concerns for developers and users alike.

On March 31, 2026, Anthropic mistakenly uploaded a debugging JavaScript sourcemap for Claude Code v2.1.88 to npm. This led to a rapid examination of the code, revealing its operational structure. While the leak exposed 512,000 lines of TypeScript, it did not compromise sensitive data like model weights or customer information. However, it did provide insights into how Claude Code operates, which could be leveraged by malicious actors.

The Flaw

The vulnerability discovered by Adversa AI is alarming. Claude Code is a 519,000+ line TypeScript application that facilitates direct interaction with the AI from the command line. It features a permission system designed to manage commands safely. Unfortunately, this system has a critical flaw: the deny rules can be bypassed.

Adversa explains that the flaw stems from a performance fix made by Anthropic. They capped the analysis of commands at 50 subcommands to prevent UI freezes. However, this cap can be exploited through prompt injection, where an attacker crafts a malicious CLAUDE.md file that generates a pipeline of commands exceeding the limit. This manipulation allows the system to revert to an 'ask' prompt, effectively ignoring the deny rules.

What's at Risk

The implications of this vulnerability are severe. Attackers could potentially exfiltrate sensitive information such as:

  • SSH private keys
  • AWS credentials
  • GitHub tokens
  • npm tokens
  • Environment secrets

The ability to bypass security measures poses a risk of credential theft at scale, which could lead to supply chain compromises and cloud infrastructure breaches. The vulnerability exists independently of the safety layer implemented in Claude, meaning that even well-crafted prompts could bypass security checks.

Patch Status

As of now, there is no public patch or fix available for this critical vulnerability. Users of Claude Code should remain vigilant and monitor updates from Anthropic regarding this issue.

Immediate Actions

Developers using Claude Code should take the following precautions:

  • Limit access to sensitive systems until a fix is released.
  • Review code for any potential vulnerabilities related to command execution.
  • Educate teams on the risks associated with prompt injection and how to mitigate them.

In conclusion, while the source code leak was concerning, the critical vulnerability poses a much greater risk. Immediate attention is required to safeguard against potential exploitation.

🔒 Pro insight: The vulnerability's exploitation potential underscores the need for rigorous security testing in AI applications, especially following code leaks.

Original article from

SWSecurityWeek· Kevin Townsend
Read Full Article

Related Pings

HIGHVulnerabilities

OpenSSH Vulnerabilities - Security Advisory Released

OpenSSH has issued a security advisory for vulnerabilities in versions prior to 10.3. Users need to update to the latest version to protect their systems. This advisory highlights critical risks that could lead to unauthorized access. Stay secure by applying the necessary updates.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Progress ShareFile - Security Vulnerability Advisory Released

Progress has issued a security advisory for ShareFile vulnerabilities. Users must update to versions v5.12.4 or later to protect their data. This is crucial for maintaining security.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Mongoose Vulnerabilities - Cesanta Issues Security Advisory

Cesanta has issued a security advisory for Mongoose, affecting versions 7.0 to 7.20. Users must update to safeguard against vulnerabilities. Don't wait—protect your systems now!

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has patched critical vulnerabilities that could allow attackers to bypass authentication and gain system access. Organizations using Cisco products are urged to update immediately to avoid risks.

Security Affairs·
HIGHVulnerabilities

CVE-2026-3502 - CISA Adds New Exploited Vulnerability

CISA has added a new vulnerability, CVE-2026-3502, to its KEV Catalog. This flaw affects the TrueConf Client and poses serious risks to federal networks. Timely remediation is essential to prevent exploitation.

CISA Advisories·
HIGHVulnerabilities

New Rowhammer Attacks - Full Control of Nvidia GPUs

New Rowhammer attacks exploit Nvidia GPUs, allowing attackers to gain complete control over host machines. This vulnerability poses significant risks for cloud environments. Users should take immediate action to secure their systems.

Ars Technica Security·