Attention: You are using an outdated browser, device or you do not have the latest version of JavaScript downloaded and so this website may not work as expected. Please download the latest software or switch device to avoid further issues.

News > Attacks & Threats > Claude Source Code Leak Highlights Big Supply Chain Missteps

Claude Source Code Leak Highlights Big Supply Chain Missteps

Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer.

Sophisticated cyberattacks targeting a variety of open source projects, including the Trivy security-scanner project, the widely used Axios Javascript package, and now Anthropic's accidental publishing of source code for its flagship Claude Code — all in a 10-day period — underscore a worrying trend of own-goal risks posed to software supply chains.

Attackers exploited a misconfigured GitHub Action in Trivy and the failure of the development team to recover from the incident to capture the needed credentials for pushing out malicious code. A compromise of the lead maintainer's account for Axios led to backdoor-installing Trojans landing in development environments. Other breaches include the KICS static-code analyzer maintained by cybersecurity firm Checkmarx, the open source LiteLLM Python library. And now, human error this week led to the publishing of more than a half million lines of the source code for Anthropic's Claude Code npm package. Read more here

Similar Stories

Microsoft has disclosed a new security vulnerability impacting on-premise versions of Exchange Server that it said has come under active exploitation in the wild. More...

A Nitrogen ransomware attack on Foxconn's North American facilities is one of 600 hits on manufacturers this year, as ga… More...

Malicious repositories can trigger code execution in Claude Code, Cursor CLI, Gemini CLI, and CoPilot CLI with minimal o… More...

Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestra… More...

A proof-of-concept exploit (PoC) shows how someone with admin privileges can exploit the issue to steal passwords, and t… More...

Have your say

 

News Categories

Microsoft has disclosed a new security vulnerability impacting on-premise versions of Exchange Server that it said has come under active exploitation in the wild. More...

A Nitrogen ransomware attack on Foxconn's North American facilities is one of 600 hits on manufacturers this year, as ga… More...

Malicious repositories can trigger code execution in Claude Code, Cursor CLI, Gemini CLI, and CoPilot CLI with minimal o… More...

Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestra… More...

A proof-of-concept exploit (PoC) shows how someone with admin privileges can exploit the issue to steal passwords, and t… More...

image

Contact Us

Security Interest Group Switzerland
c/o Bridge Head AG
Sulzbergstrasse 34
5430 Wettingen
Switzerland

Follow Us

This website is powered by
ToucanTech