
The Claude Code Leak Proved What We've Been Building For
Today Anthropic accidentally shipped 512,000 lines of Claude Code's source code to npm. A source map file that should have been stripped from the build made it into version 2.1.88 of the @anthropic-ai/claude-code package. Within hours, the entire codebase was mirrored on GitHub and dissected by thousands of developers. The leak itself was a packaging error. Human mistake. It happens. But what the leak revealed is the part that matters. The Real Problem Isn't the Leak Check Point Research had already disclosed CVE-2025-59536 back in October — a vulnerability where malicious .mcp.json files in a repository could execute arbitrary shell commands the moment you open Claude Code. No trust prompt. No confirmation dialog. The MCP server initializes, runs whatever commands are in the config, and your API keys are gone before you've read a single line of code. The leaked source code made this worse. Now attackers have the exact orchestration logic for Hooks and MCP servers. They can see precise
Continue reading on Dev.to Python
Opens in a new tab




