NIXPKGS-2026-0150
GitHub issue
published on 7 Feb 2026
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
6 packages
- gnomeExtensions.claude-code-usage-indicator
- vscode-extensions.anthropic.claude-code
- gnomeExtensions.claude-code-switcher
- claude-code-bin
- claude-code-acp
- claude-code-router
-
@LeSuisse
removed
8 maintainers
- @omarjatoi
- @malob
- @markus1189
- @storopoli
- @xiaoxiangmoe
- @mirkolenz
- @Prince213
- @honnip
- @LeSuisse accepted
- @LeSuisse published on GitHub
Claude Code Vulnerable to Command Injection via Piped sed Command Bypasses File Write Restrictions
Claude Code is an agentic coding tool. Prior to version 2.0.55, Claude Code failed to properly validate commands using piped sed operations with the echo command, allowing attackers to bypass file write restrictions. This vulnerability enabled writing to sensitive directories like the .claude folder and paths outside the project scope. Exploiting this required the ability to execute commands through Claude Code with the "accept edits" feature enabled. This issue has been patched in version 2.0.55.
Affected products
claude-code
- ==< 2.0.55
Package maintainers
Ignored maintainers (3)
-
@omarjatoi Omar Jatoi
-
@malob Malo Bourgon <mbourgon@gmail.com>
-
@markus1189 Markus Hauck <markus1189@gmail.com>