Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Anthropic’s Claude Code Source Leak via npm Registry

Anthropic’s Claude Code Source Leak via npm Registry

Posted on March 31, 2026 By CWS

Anthropic’s Claude Code, a proprietary CLI tool, has had its TypeScript source code inadvertently exposed due to a misconfigured npm package. This exposure was discovered when a security researcher found a leaked .map file that referenced the unprotected codebase on Anthropic’s cloud infrastructure.

Details of the Security Breach

On March 31, 2026, Chaofan Shou, a security researcher, publicly disclosed the leak, revealing that the @anthropic-ai/claude-code npm package contained a source map file. This file provided a direct reference to the complete, unminified TypeScript source, which was downloadable as a ZIP file from Anthropic’s R2 cloud bucket.

The codebase, now preserved in a public GitHub repository, includes around 1,900 files and over 512,000 lines of TypeScript code. It encompasses critical parts of the Claude Code CLI tool, utilizing the Bun runtime and a React + Ink terminal UI framework.

Scope and Impact of the Leak

The leaked files are comprehensive, involving every essential subsystem of the Claude Code. Key components include the QueryEngine.ts file, which contains approximately 46,000 lines of code and handles the core LLM API engine, and Tool.ts, with around 29,000 lines, defining agent tool types and permissions.

Additionally, the architecture reveals about 40 agent tools and approximately 85 slash commands, covering various functionalities such as Git workflows and multi-agent orchestration. Internal feature flags like PROACTIVE and VOICE_MODE, indicative of unreleased features, were also disclosed.

Understanding the Source Map Vulnerability

Source maps are intended for debugging by mapping compiled JavaScript back to its original source. However, when incorrectly included in npm production releases, they can expose proprietary code, bypassing obfuscation efforts. This isn’t the first instance for Anthropic; a similar issue occurred in early 2025.

The breach poses significant intellectual property risks, as the exposed code includes internal API logic and undisclosed features. Anthropic has yet to release a public statement addressing the incident.

Developers using Claude Code should keep an eye on Anthropic’s security advisories and ensure they are using patched npm releases. It is advisable to avoid third-party mirrors of the leaked source code.

For more updates on cybersecurity, follow us on Google News, LinkedIn, and X. Reach out if you have a story to share.

Cyber Security News Tags:Anthropic, Bun runtime, Claude Code, cloud storage, Cybersecurity, data breach, developer tools, Ink framework, intellectual property, npm package, npm registry, React, security advisories, source leak, source maps, TypeScript

Post navigation

Previous Post: TeamPCP Exploits AWS for Data Breaches in Latest Cyberattack
Next Post: AI Arms Race: Prioritizing Unified Exposure Management

Related Posts

CISA Adds Critical React2Shell Vulnerability to KEV Catalog Following Active Exploitation CISA Adds Critical React2Shell Vulnerability to KEV Catalog Following Active Exploitation Cyber Security News
U.S. Secret Service Dismantles 300 SIM Servers and 100,000 SIM Cards U.S. Secret Service Dismantles 300 SIM Servers and 100,000 SIM Cards Cyber Security News
Microsoft 365 Copilot Prompt Injection Vulnerability Allows Attackers to Exfiltrate Sensitive Data Microsoft 365 Copilot Prompt Injection Vulnerability Allows Attackers to Exfiltrate Sensitive Data Cyber Security News
Highly Sophisticated macOS DigitStealer Employs Multi-Stage Attacks to Evade detection Highly Sophisticated macOS DigitStealer Employs Multi-Stage Attacks to Evade detection Cyber Security News
Critical Vivotek Vulnerability Allows Remote Users to Inject Arbitrary Code Critical Vivotek Vulnerability Allows Remote Users to Inject Arbitrary Code Cyber Security News
TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Venom Stealer: Revolutionizing Cyber Threats with Persistent Credential Theft
  • Critical ChatGPT Flaw Exposed User Data to Attackers
  • Data Integrity Crisis: Trusting Information in AI Era
  • Exploitation of TrueConf Flaw Targets Southeast Asian Governments
  • EvilTokens: A New Phishing Threat Targeting Microsoft Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Venom Stealer: Revolutionizing Cyber Threats with Persistent Credential Theft
  • Critical ChatGPT Flaw Exposed User Data to Attackers
  • Data Integrity Crisis: Trusting Information in AI Era
  • Exploitation of TrueConf Flaw Targets Southeast Asian Governments
  • EvilTokens: A New Phishing Threat Targeting Microsoft Accounts

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark