Skip to content
Tech News
← Back to articles

Claude Code leak used to push infostealer malware on GitHub

read original get Cybersecurity Awareness Poster → more articles
Why This Matters

The exploitation of the Claude Code leak highlights the ongoing risks of source code disclosures, as threat actors leverage such leaks to distribute malware like Vidar. This incident underscores the importance of robust security measures and vigilant monitoring of open-source repositories to protect developers and users from malicious activities. It also emphasizes the need for increased awareness about fake repositories and the dangers of downloading unverified code.

Key Takeaways

Threat actors are exploiting the recent Claude Code source code leak by using fake GitHub repositories to deliver Vidar information-stealing malware.

Claude Code is a terminal-based AI agent from Anthropic, designed to execute coding tasks directly in the terminal and act as an autonomous agent, capable of direct system interaction, LLM API call handling, MCP integration, and persistent memory.

On March 31, Anthropic accidentally exposed the full client-side source code of the new tool via a 59.8 MB JavaScript source map included by accident in the published npm package.

The leak contained 513,000 lines of unobfuscated TypeScript across 1,906 files, revealing the agent’s orchestration logic, permissions, and execution systems, hidden features, build details, and security-related internals.

The exposed code was rapidly downloaded by a large number of users and published on GitHub, where it was forked thousands of times.

According to a report from cloud security company Zscaler, the leak created an opportunity for threat actors to deliver the Vidar infostealer to users looking for the Claude Code leak.

The researchers found that a malicious GitHub repository published by user “idbzoomh” posted a fake leak and advertised it as having “unlocked enterprise features” and no usage restrictions.

GitHub repository spreading malware

Source: Zscaler

To drive as much traffic to the bogus leak, the repository is optimized for search engines and is shown among the first results on Google Search for queries like “leaked Claude Code.”

... continue reading