
Anthropic's Claude Code: Flaws Threaten Developer Devices and Team Keys
Immediate risk and scope
Check Point Research disclosed configuration weaknesses in Anthropic's Claude Code that could let an attacker run commands on a developer machine without visible prompts and exfiltrate API keys from cloned repositories (tracked as CVE-2025-59536). The core vector relied on editable, repo‑level configuration and automation hooks that are auto-applied during project initialization; because those artifacts propagate when a repository is cloned, a single poisoned repo can pivot from a host compromise to team‑wide credential exposure.
Technical mechanics and ecosystem amplifiers
The exploit chain combines three elements: repository‑sourced config that can include executable actions, automation that applies those configs automatically (for example, agent task graphs or devcontainer hooks), and persistent integrations or connectors whose permissions can be abused to reroute API traffic and capture tokens. Anthropic’s Claude Code — built on high‑context models and agent primitives that persist tasks and state — magnifies this risk by making multi‑file reasoning and automated remediation actions more powerful, but also more able to synthesize end‑to‑end exploit steps.
Related research shows this is not unique to Claude Code: public incidents across agent and developer tooling (OpenClaw gateway CVE‑2026‑25253, poisoned marketplace skills, and Visual Studio Code devcontainer/.vscode auto‑applies in Codespaces) illustrate the same trust‑boundary failures. Attackers can weaponize repo configs, marketplace skills or browser‑to‑gateway bridges to harvest session tokens, bypass consent checks, and execute commands at scale when defaults are permissive.
Anthropic’s response and disclosure cadence
Anthropic deployed mitigations after a staggered disclosure window (July–October 2025) and added extra confirmations for high‑risk actions; the company also rolled Claude Code Security as a limited enterprise preview, applying filters and staged human review to findings. Independent researchers and vendors reported that the same reasoning techniques accelerate both defensive discovery and offensive exploit development, creating a narrow window where disclosed but unpatched dependencies are broadly usable by attackers.
Operational recommendations and priorities
Organizations should assume project manifests and repo configs are exploitable supply‑chain elements: enforce signed manifests, require explicit prompts before applying executable repo settings, scope tokens to the minimum privilege and use ephemeral credentials, and add runtime enforcement in CI/CD to block unexpected outbound integrations. Immediate actions include rotating exposed keys, auditing Codespaces/Codeserver and agent connectors, inventorying internet‑reachable agent gateways, and revoking compromised publisher tokens or marketplace artifacts. Longer‑term controls should include cryptographic provenance for repo artifacts and marketplace packages, policy‑driven enforcement in hosted developer environments, and attestation-based controls for agent actions.
Implications for vendors and procurement
Beyond patching specific bugs, clients and regulators will demand demonstrable hardening of developer toolchains, vendor telemetry for action provenance, and procurement clauses that enforce secure defaults for agent connectors and repository execution. The combined set of incidents suggests that defenders must rearchitect trust assumptions around developer convenience features to prevent small, low‑interaction lures from scaling into broad tenant compromises.
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you

Anthropic’s Claude Code Security surfaces 500+ high-severity software flaws
Anthropic applied its latest Claude Code reasoning to production open-source repos, surfacing >500 high‑severity findings and productizing the capability in roughly 15 days. The technical leap — amplified by Opus 4.6’s much larger context windows and growing integrations into developer platforms — accelerates defender triage but also expands a short-term exploitable window and deployment attack surface unless governance, credential hygiene, and remediation orchestration improve.

Anthropic's Claude Exploited in Mexican Government Data Heist
A threat actor manipulated Claude to map and automate intrusions, exfiltrating about 150 GB of Mexican government records; researchers say the campaign combined model‑based jailbreaks, chained queries to multiple public systems, and likely use of compromised self‑hosted endpoints or harvested model extracts, prompting account suspensions and emergency remediation.
GitHub expands Agent HQ to host Anthropic’s Claude and OpenAI’s Codex inside developer workflows
GitHub has added Anthropic’s Claude and OpenAI’s Codex as selectable coding agents inside Copilot interfaces for Copilot Pro Plus and Enterprise subscribers, integrating agent choice directly into issues, PRs and editor workflows. The move aligns with a broader industry shift toward embeddable agent orchestration (Copilot SDK, MCP-enabled tooling and native clients) and raises new operational priorities around billing, grounding, auditability and vendor comparison.

Anthropic’s Claude Code Adds Persistent Tasks to Turn Agents into Project Managers
Anthropic updated Claude Code with a persistent Task primitive that moves project state out of ephemeral chat and onto durable, filesystem-backed artifacts, enabling cross-session coordination, CI-friendly runs, and stronger dependency enforcement. The change arrives alongside rising integration work—examples include Asana-style connectors that bind agents to real project data and permission models—making agent durability and governance primitives timely for teams adopting AI-driven pipelines.

Anthropic Accuses DeepSeek, MiniMax and Moonshot of Distillation Mining of Claude
Anthropic alleges three mainland-China labs used over 24,000 fake accounts to record roughly 16 million exchanges from its Claude model to perform large-scale distillation; OpenAI and other industry disclosures show similar extraction tactics but have not independently verified Anthropic’s full counts, deepening policy and legal debates over export controls, telemetry, and model-protection measures.
Critical OpenClaw Flaw Enabled Remote Hijack Through Malicious Web Page
A newly disclosed OpenClaw vulnerability (CVE-2026-25253) let a single malicious webpage steal a browser-exposed token and escalate it into full gateway access and host command execution; OpenClaw released a fix in 2026.1.29. Independent scans and research also found large-scale operational exposure—including hundreds of internet-reachable admin interfaces, unmoderated Moltbook skill posts with hidden prompt‑injection fragments, and separate misconfigurations that leaked millions of API tokens and tens of thousands of emails—so operators must patch, revoke keys, inventory reachable instances, and tighten access and content‑distribution controls immediately.
Security flaws in popular open-source AI assistant expose credentials and private chats
Researchers discovered that internet-accessible instances of the open-source assistant Clawdbot can leak sensitive credentials and conversation histories when misconfigured. The exposure enables attackers to harvest API keys, impersonate users, and in one test led to extracting a private cryptographic key within minutes.

TeamT5 ThreatSonar vulnerability exploited; CISA adds flaw to KEV list
CISA added a high-severity vulnerability in TeamT5’s ThreatSonar (CVE-2024-7694) to its Known Exploited Vulnerabilities catalogue and required federal remediation by March 10, 2026. The bug allows unsafe file uploads that can be chained with elevated privileges to achieve remote command execution; a vendor patch was issued in August 2024 but evidence of in‑the‑wild exploitation has been reported.