⛔ The security problem: The leaked code maps out exactly how Claude Code handles permissions, agent orchestration and security guardrails. Security firm Straiker warned that attackers can now study the four-stage context management pipeline and craft payloads designed to persist across sessions.
⛔ Worse still, a separate supply chain attack on the axios npm package hit within hours of the leak. Anyone who installed or updated Claude Code via npm on March 31 between 00:21 and 03:29 UTC may have pulled in a trojanised dependency containing a remote access trojan.
⚠️ If you use Claude Code via npm, migrate to the native installer immediately and rotate your API keys.
I took this verbatim from a newsletter. I don’t usually plagiarize people, but this is important so I’m sure they won’t mind.