Anthropic Claude Code Leak Reveals Critical Command Injection Vulnerabilities
anthropic claude
| Source: Mastodon | Original article
Anthropic’s flagship chatbot, Claude, was thrust into the spotlight on Tuesday after a leak of its internal codebase exposed a series of command‑injection flaws that could let an attacker run arbitrary system commands on any server that hosts the model’s API endpoint. The source files, unintentionally published to the public npm registry via a mis‑generated source‑map, were quickly mirrored on GitHub and dissected by security researchers.
The vulnerability stems from a low‑level request‑handling module that concatenates user‑supplied strings into shell commands without proper sanitisation. Exploiting the flaw would give an adversary the ability to read or modify files, install malware, or exfiltrate data from the infrastructure that powers Claude’s cloud service. ThreatLabz, which analysed the leak, also identified a malicious lure embedded in the package that distributes Vidar and GhostSocks malware, suggesting that threat actors are already weaponising the exposed code.
Anthropic has framed the incident as a “release‑packaging issue caused by human error, not a security breach,” and has pledged to roll out an emergency patch to all production instances within 48 hours. The company’s response is critical because Claude underpins a growing ecosystem of enterprise‑grade applications, from customer‑support bots to code‑generation assistants, many of which rely on the same backend services that the flawed module touches.
What to watch next: whether Anthropic’s remediation timeline holds and if independent auditors will certify the patch’s completeness; how quickly downstream developers adopt the updated SDKs; and whether regulators in the EU and US will probe the incident as a potential breach of data‑protection obligations. The episode also raises broader questions about the security hygiene of AI‑model supply chains, a theme we explored in our April 19 piece on Claude’s design philosophy.
Sources
Back to AIPULSEN