2.1.39
11 months ago
1 days ago
Known vulnerabilities in the @anthropic-ai/claude-code package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
@anthropic-ai/claude-code is an Use Claude, Anthropic's AI assistant, right from your terminal. Claude can understand your codebase, edit files, run terminal commands, and handle entire workflows for you. Affected versions of this package are vulnerable to UNIX Symbolic Link (Symlink) Following via the file access process. An attacker can access restricted files by leveraging symbolic links to bypass deny rules configured in How to fix UNIX Symbolic Link (Symlink) Following? Upgrade | <2.1.7 |
@anthropic-ai/claude-code is an Use Claude, Anthropic's AI assistant, right from your terminal. Claude can understand your codebase, edit files, run terminal commands, and handle entire workflows for you. Affected versions of this package are vulnerable to Arbitrary Code Injection via the How to fix Arbitrary Code Injection? Upgrade | <2.0.72 |
@anthropic-ai/claude-code is an Use Claude, Anthropic's AI assistant, right from your terminal. Claude can understand your codebase, edit files, run terminal commands, and handle entire workflows for you. Affected versions of this package are vulnerable to Directory Traversal via the ZSH clobber syntax. An attacker can write arbitrary files outside the intended directory by injecting untrusted content into the context window while the user is operating in a ZSH environment. Note: This is only exploitable if the user is using ZSH and allows untrusted content to be added to the context window. How to fix Directory Traversal? Upgrade | <2.0.74 |