Close Menu
  • Home
  • Education
  • Health
  • National News
  • Politics
  • Relationship & Wellness
  • World News
What's Hot

Miami Heat vs Philadelphia 76ers injury report: Who's playing, injured and questionable players, head-to-head records, team stats, and more (February 25, 2026) | NBA News – The Times of India

February 26, 2026

Cancellations, refunds, name corrections: What changes for flyers with DGCA’s new rules

February 26, 2026

Anthropic Claude Code's security flaws expose devices to silent hacking, triggered from remote code execution; claims report – The Times of India

February 26, 2026
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Global News Bulletin
SUBSCRIBE
  • Home
  • Education
  • Health
  • National News
  • Politics
  • Relationship & Wellness
  • World News
Global News Bulletin
Home»Business»Anthropic Claude Code's security flaws expose devices to silent hacking, triggered from remote code execution; claims report – The Times of India
Business

Anthropic Claude Code's security flaws expose devices to silent hacking, triggered from remote code execution; claims report – The Times of India

editorialBy editorialFebruary 26, 2026No Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email Telegram Copy Link
Anthropic Claude Code's security flaws expose devices to silent hacking, triggered from remote code execution; claims report – The Times of India
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link
Anthropic Claude Code's security flaws expose devices to silent hacking, triggered from remote code execution; claims report

Security researchers claim to have uncovered three security vulnerabilities in Claude Code, Anthropic’s command-line AI tool. These flaws could have allowed attackers to execute code remotely on a developer’s machine or steal sensitive API keys. According to a Check Point report, company’s researchers found and reported all three flaws to Anthropic, which issued fixes for all and CVEs for two. While Anthropic fixed the security flaw, researchers say that the issues illustrate a worrisome supply chain threat as enterprises incorporate AI coding tools like Claude into their development processes and essentially turn configuration files into a new attack surface.The attack vector reportedly relied on a supply chain strategy wherein hackers could inject malicious configurations into public repositories, then simply wait for a developer to clone and open the compromised project. “The ability to execute arbitrary commands through repository-controlled configuration files created severe supply chain risks, where a single malicious commit could compromise any developer working with the affected repository,” Check Point researchers Aviv Donenfeld and Oded Vanunu said in the report.The three security vulnerabilities are said to stem from Anthropic Claude’s design, which is intended to make it easier for development teams to collaborate. The AI coding tool enables this by embedding project-level configuration files (.claude/settings.json file) directly within repositories, so that when a developer clones a project, they automatically apply the same settings used by their teammates.Report says that any contributor with commit access can modify these files. The researchers found that cloning and opening a malicious repository sometimes allowed them to bypass built-in safeguards and trigger hidden commands and execute malicious code.

Abusing Hooks for RCE

The first flaw involved the abuse of Claude’s Hooks feature. Designed to run user-defined shell commands at specific points in the tool’s lifecycle, Hooks were intended to automate routine tasks.However, because these hooks are defined in the .claude/settings.json file—which is part of the repository—an attacker with commit access could embed malicious shell commands into a project. When an unsuspecting developer opened the project, Claude would execute these commands automatically without requesting permission.“An attacker could configure the hook to execute any shell command—such as downloading and running a malicious payload,” the researchers warned, demonstrating the flaw by remotely launching a reverse shell on a victim’s machine. Check Point reported the malicious hooks flaw to Anthropic on July 21, 2025, and the AI maker implemented the final fix about a month later, publishing this GitHub Security Advisory GHSA-ph6w-f82w-28w6 on August 29.

MCP consent bypass bug

The second vulnerability allowed for Remote Code Execution (RCE) by circumventing the Model Context Protocol (MCP) safety prompts. While Anthropic had implemented warnings requiring user approval before running external MCP servers, researchers discovered a workaround.By manipulating two specific repository-controlled settings, the team was able to override these safeguards, causing malicious commands to execute the moment Claude was launched—before the user could even see a trust dialog. This bypass (CVE-2025-59536) essentially rendered the tool’s security prompts useless against a crafted repository.

Redirecting traffic to steal API Keys

The final vulnerability targeted the developer’s credentials. Researchers found they could manipulate the ANTHROPIC_BASE_URL variable within a project’s configuration. Attackers can exploit the third flaw for API key theft. By redirecting this endpoint to an attacker-controlled server, all of Claude’s API traffic—including the plaintext authorization header containing the user’s API key—was exposed.The researchers configured ANTHROPIC_BASE_URL to route through their local proxy, and watched all Claude Code’s API traffic in real time. Every one of Claude’s calls to Anthropic servers “included the authorization header – our full Anthropic API key, completely exposed in plaintext,” they wrote.An attacker could abuse this trick to redirect traffic and steal a developer’s active API key. It’s important because the API includes a feature called Workspaces to help developers manage multiple Claude deployments by allowing multiple API keys to share access to the same cloud-based project files. Files are connected to the workspace – not the single key – and any API key belonging to the workspace also has visibility into any of the workspace’s stored files.

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleDeflators, discrepancies, data sources: After 11 years, India’s GDP set to get updated
Next Article Cancellations, refunds, name corrections: What changes for flyers with DGCA’s new rules
editorial
  • Website

Related Posts

Miami Heat vs Philadelphia 76ers injury report: Who's playing, injured and questionable players, head-to-head records, team stats, and more (February 25, 2026) | NBA News – The Times of India

February 26, 2026

Gauhati HC issues notice to CM Himanta Biswa Sarma over ‘hate speeches’ | Guwahati News – The Times of India

February 26, 2026

Afghanistan Pakistan Border Clashes: Pakistani airstrikes in Afghanistan: 15 outposts captured, 40 soldiers killed as Taliban launches major offensive | World News – The Times of India

February 26, 2026

Salman Agha's wife Sabba Manzer slams Pakistan fans: Abusing me and my son won't win you the World Cup | Cricket News – The Times of India

February 26, 2026

Kerala HC stays ‘The Kerala Story 2’ for 15 days, a day before scheduled release | India News – The Times of India

February 26, 2026

Watch: UP CM Yogi Adityanath takes spin on Japan’s futuristic Maglev train | India News – The Times of India

February 26, 2026
Add A Comment
Leave A Reply Cancel Reply

Economy News

Miami Heat vs Philadelphia 76ers injury report: Who's playing, injured and questionable players, head-to-head records, team stats, and more (February 25, 2026) | NBA News – The Times of India

By editorialFebruary 26, 2026

Miami Heat vs Philadelphia 76ers (Image via Getty) Miami Heat play the Philadelphia 76ers on…

Cancellations, refunds, name corrections: What changes for flyers with DGCA’s new rules

February 26, 2026

Anthropic Claude Code's security flaws expose devices to silent hacking, triggered from remote code execution; claims report – The Times of India

February 26, 2026
Top Trending

Miami Heat vs Philadelphia 76ers injury report: Who's playing, injured and questionable players, head-to-head records, team stats, and more (February 25, 2026) | NBA News – The Times of India

By editorialFebruary 26, 2026

Miami Heat vs Philadelphia 76ers (Image via Getty) Miami Heat play the…

Cancellations, refunds, name corrections: What changes for flyers with DGCA’s new rules

By editorialFebruary 26, 2026

4 min readNew DelhiUpdated: Feb 27, 2026 01:01 AM IST Aviation regulator…

Anthropic Claude Code's security flaws expose devices to silent hacking, triggered from remote code execution; claims report – The Times of India

By editorialFebruary 26, 2026

Security researchers claim to have uncovered three security vulnerabilities in Claude Code,…

Subscribe to News

Get the latest sports news from NewsSite about world, sports and politics.

Facebook X (Twitter) Pinterest Vimeo WhatsApp TikTok Instagram

News

  • Education
  • Health
  • National News
  • Relationship & Wellness
  • World News
  • Politics

Company

  • Information
  • Advertising
  • Classified Ads
  • Contact Info
  • Do Not Sell Data
  • GDPR Policy
  • Media Kits

Services

  • Subscriptions
  • Customer Support
  • Bulk Packages
  • Newsletters
  • Sponsored News
  • Work With Us

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

© Copyright Global News Bulletin.
  • Privacy Policy
  • Terms
  • Accessibility
  • Website Developed by Digital Strikers

Type above and press Enter to search. Press Esc to cancel.