Nixpkgs Security Tracker

Login with GitHub

Details of issue NIXPKGS-2026-0150

NIXPKGS-2026-0150
published on 7 Feb 2026
updated 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    6 packages
    • gnomeExtensions.claude-code-usage-indicator
    • vscode-extensions.anthropic.claude-code
    • gnomeExtensions.claude-code-switcher
    • claude-code-bin
    • claude-code-acp
    • claude-code-router
  • @LeSuisse removed
    8 maintainers
    • @omarjatoi
    • @malob
    • @markus1189
    • @storopoli
    • @xiaoxiangmoe
    • @mirkolenz
    • @Prince213
    • @honnip
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Claude Code Vulnerable to Command Injection via Piped sed Command Bypasses File Write Restrictions

Claude Code is an agentic coding tool. Prior to version 2.0.55, Claude Code failed to properly validate commands using piped sed operations with the echo command, allowing attackers to bypass file write restrictions. This vulnerability enabled writing to sensitive directories like the .claude folder and paths outside the project scope. Exploiting this required the ability to execute commands through Claude Code with the "accept edits" feature enabled. This issue has been patched in version 2.0.55.

Affected products

claude-code
  • ==< 2.0.55

Matching in nixpkgs

Package maintainers

Ignored maintainers (3)
Upstream advisory: https://github.com/anthropics/claude-code/security/advisories/GHSA-mhg7-666j-cqg4