Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: claude-code

Found 6 matching suggestions

updated 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    6 packages
    • claude-code-acp
    • claude-code-bin
    • claude-code-router
    • gnomeExtensions.claude-code-switcher
    • vscode-extensions.anthropic.claude-code
    • gnomeExtensions.claude-code-usage-indicator
  • @LeSuisse removed
    8 maintainers
    • @omarjatoi
    • @malob
    • @markus1189
    • @storopoli
    • @xiaoxiangmoe
    • @mirkolenz
    • @Prince213
    • @honnip
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Claude Code Has Sandbox Escape via Persistent Configuration Injection in settings.json

Claude Code is an agentic coding tool. Prior to version 2.1.2, Claude Code's bubblewrap sandboxing mechanism failed to properly protect the .claude/settings.json configuration file when it did not exist at startup. While the parent directory was mounted as writable and .claude/settings.local.json was explicitly protected with read-only constraints, settings.json was not protected if it was missing. This allowed malicious code running inside the sandbox to create this file and inject persistent hooks (such as SessionStart commands) that would execute with host privileges when Claude Code was restarted. This issue has been patched in version 2.1.2.

Affected products

claude-code
  • ==< 2.1.2

Matching in nixpkgs

Package maintainers

Ignored maintainers (3)
Upstream advisory: https://github.com/anthropics/claude-code/security/advisories/GHSA-ff64-7w26-62rf
updated 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    6 packages
    • gnomeExtensions.claude-code-usage-indicator
    • vscode-extensions.anthropic.claude-code
    • gnomeExtensions.claude-code-switcher
    • claude-code-bin
    • claude-code-acp
    • claude-code-router
  • @LeSuisse removed
    8 maintainers
    • @omarjatoi
    • @malob
    • @markus1189
    • @storopoli
    • @xiaoxiangmoe
    • @mirkolenz
    • @Prince213
    • @honnip
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Claude Code Vulnerable to Command Injection via Piped sed Command Bypasses File Write Restrictions

Claude Code is an agentic coding tool. Prior to version 2.0.55, Claude Code failed to properly validate commands using piped sed operations with the echo command, allowing attackers to bypass file write restrictions. This vulnerability enabled writing to sensitive directories like the .claude folder and paths outside the project scope. Exploiting this required the ability to execute commands through Claude Code with the "accept edits" feature enabled. This issue has been patched in version 2.0.55.

Affected products

claude-code
  • ==< 2.0.55

Matching in nixpkgs

Package maintainers

Ignored maintainers (3)
Upstream advisory: https://github.com/anthropics/claude-code/security/advisories/GHSA-mhg7-666j-cqg4
updated 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    6 packages
    • claude-code-acp
    • claude-code-bin
    • claude-code-router
    • gnomeExtensions.claude-code-switcher
    • vscode-extensions.anthropic.claude-code
    • gnomeExtensions.claude-code-usage-indicator
  • @LeSuisse removed
    8 maintainers
    • @omarjatoi
    • @malob
    • @markus1189
    • @storopoli
    • @xiaoxiangmoe
    • @mirkolenz
    • @Prince213
    • @honnip
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Claude Code Has Permission Deny Bypass Through Symbolic Links

Claude Code is an agentic coding tool. Prior to version 2.1.7, Claude Code failed to strictly enforce deny rules configured in settings.json when accessing files through symbolic links. If a user explicitly denied Claude Code access to a file (such as /etc/passwd) and Claude Code had access to a symbolic link pointing to that file, it was possible for Claude Code to read the restricted file through the symlink without triggering deny rule enforcement. This issue has been patched in version 2.1.7.

Affected products

claude-code
  • ==< 2.1.7

Matching in nixpkgs

Package maintainers

Ignored maintainers (3)
Upstream advisory: https://github.com/anthropics/claude-code/security/advisories/GHSA-4q92-rfm6-2cqx
updated 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    6 packages
    • claude-code-acp
    • claude-code-router
    • gnomeExtensions.claude-code-switcher
    • vscode-extensions.anthropic.claude-code
    • gnomeExtensions.claude-code-usage-indicator
    • claude-code-bin
  • @LeSuisse accepted
  • @LeSuisse removed
    8 maintainers
    • @omarjatoi
    • @malob
    • @markus1189
    • @storopoli
    • @xiaoxiangmoe
    • @mirkolenz
    • @Prince213
    • @honnip
  • @LeSuisse published on GitHub
Claude Code Vulnerable to Command Injection via Directory Change Bypasses Write Protection

Claude Code is an agentic coding tool. Prior to version 2.0.57, Claude Code failed to properly validate directory changes when combined with write operations to protected folders. By using the cd command to navigate into sensitive directories like .claude, it was possible to bypass write protection and create or modify files without user confirmation. Reliably exploiting this required the ability to add untrusted content into a Claude Code context window. This issue has been patched in version 2.0.57.

Affected products

claude-code
  • ==< 2.0.57

Matching in nixpkgs

Package maintainers

Ignored maintainers (3)
Upstream advisory: https://github.com/anthropics/claude-code/security/advisories/GHSA-66q4-vfjg-2qhh
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    6 packages
    • claude-code-acp
    • claude-code-bin
    • gnomeExtensions.claude-code-switcher
    • vscode-extensions.anthropic.claude-code
    • gnomeExtensions.claude-code-usage-indicator
    • claude-code-router
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Claude Code has a Command Injection in find Command Bypasses User Approval Prompt

Claude Code is an agentic coding tool. Prior to version 2.0.72, due to an error in command parsing, it was possible to bypass the Claude Code confirmation prompt to trigger execution of untrusted commands through the find command. Reliably exploiting this required the ability to add untrusted content into a Claude Code context window. This issue has been patched in version 2.0.72.

Affected products

claude-code
  • ==< 2.0.72

Matching in nixpkgs

pkgs.claude-code

An agentic coding tool that lives in your terminal, understands your codebase, and helps you code faster

Package maintainers

Upstream advisory: https://github.com/anthropics/claude-code/security/advisories/GHSA-qgqw-h4xq-7w8w
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    6 packages
    • claude-code-acp
    • claude-code-router
    • gnomeExtensions.claude-code-switcher
    • vscode-extensions.anthropic.claude-code
    • gnomeExtensions.claude-code-usage-indicator
    • claude-code-bin
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Cluade Code has a Path Restriction Bypass via ZSH Clobber which Allows Arbitrary File Writes

Claude Code is an agentic coding tool. Prior to version 2.0.74, due to a Bash command validation flaw in parsing ZSH clobber syntax, it was possible to bypass directory restrictions and write files outside the current working directory without user permission prompts. Exploiting this required the user to use ZSH and the ability to add untrusted content into a Claude Code context window. This issue has been patched in version 2.0.74.

Affected products

claude-code
  • ==< 2.0.74

Matching in nixpkgs

pkgs.claude-code

An agentic coding tool that lives in your terminal, understands your codebase, and helps you code faster

Package maintainers

Upstream advisory: https://github.com/anthropics/claude-code/security/advisories/GHSA-q728-gf8j-w49r