claude-code-leak-security-breach-notification
Exposure of Claude Code Source Code Raises Concerns
In a recent development, the open-source AI coding tool, Claude Code, has inadvertently leaked its source code, exposing over 500,000 lines of code, built-in tools, and full command line libraries. The exposure occurred when the developers accidentally included an unobfuscated TypeScript source code in the tool’s npm package.
How It Happened
The exposure happened due to a mistake made by the developers, who included an unobfuscated TypeScript source code in the Claude Code npm package. This allowed anyone with access to the package to view sensitive information.
Consequences and Analysis
Experts are warning that even minor mistakes like this can have significant consequences, highlighting the importance of double-checking configuration files and ensuring that sensitive information is properly secured.
Timeline and Indicators of Compromise
- February 2026: Claude Code source code inadvertently leaked
- March 2026: Exposure reported by researchers
- April 2026: Developers acknowledge exposure and attribute it to human error
- Ongoing: Experts continue to review and analyze the exposed code
Indicators of Compromise:
- Unobfuscated TypeScript source code in the Claude Code npm package
- Reference to a Cloudflare R2 storage bucket-hosted zip archive
- Over 500,000 lines of exposed code, including built-in tools and full command line libraries
Domains:
- claudicode.ai
- github.com
- cloudflare.com
Attack Techniques:
- Inadvertent exposure of sensitive information through misconfiguration
- Use of AI-powered tools for reconnaissance and vulnerability detection
Threat Actor Behavior:
- Anthropic, the developers of Claude Code, acknowledged the exposure and attributed it to human error
- Researchers and experts analyzed the exposed code and identified potential vulnerabilities
Financial Losses:
Not specified
Law Enforcement Actions:
None reported
