Claude Code Leak Fuels GitHub Vidar Malware

You search 'Claude Code leak' on Google. Top result: a shiny GitHub repo promising unlocked features. Click download, and Vidar stealer burrows into your machine. Anthropic's slip-up just supercharged a classic scam.

Malicious GitHub repository page baiting downloads with Claude Code leak promise

Key Takeaways

  • Anthropic's Claude Code source leak is weaponized via SEO-optimized fake GitHub repos delivering Vidar infostealer.
  • This exploits developer curiosity, turning a coding tool hype into a malware vector—no exploits needed.
  • Signals rising risks for AI agents: leaks reveal architectures, paving way for advanced agent-jacking attacks.

Picture this: you’re knee-deep in a late-night coding binge, terminal humming, and bam—Anthropic drops Claude Code, their slick terminal AI agent that runs code, hits APIs, even chats with your system like it’s alive. Then, March 31. Accidental npm package bloats with 59.8 MB of raw JavaScript source map. Boom. 513,000 lines of TypeScript spilled—unobfuscated, across 1,906 files. Orchestration guts, permissions, hidden Easter eggs, security plumbing. All out there.

And hackers? They pounced. Not on the code itself—no zero-days here—but on the hype. Zscaler’s researchers clocked it first: fake GitHub repos masquerading as the leak, optimized to dominate searches for “Claude Code leak.” One from user “idbzoomh,” dangling “unlocked enterprise features” and zero restrictions. Traffic magnet.

Users bite. Download the 7-Zip. Fire up ClaudeCode_x64.exe—a Rust dropper. Vidar infostealer unloads, plus GhostSocks for proxying out your data. Updated often, too; next batch might pack worse.

How a Simple Source Map Slip Unleashed This Chaos

Here’s the thing—Anthropic didn’t just leak code. They leaked trust. Claude Code’s an agent, right? Autonomous, system-touching, memory-persistent. That source reveals how it orchestrates tasks, handles LLM calls, integrates MCP. For pentesters? Goldmine. For malware peddlers? Better: a lure. Why build from scratch when curiosity drives downloads?

Threat actors love this playbook. Remember Log4Shell? Repos flooded with “PoC exploits,” half malicious. Late 2025 campaigns hit vuln researchers the same way. GitHub’s defenses—automated scans, takedowns—lag. Malicious repos fork fast, SEO-jacked titles climb Google.

According to a report from cloud security company Zscaler, the leak created an opportunity for threat actors to deliver the Vidar infostealer to users looking for the Claude Code leak.

Spot on. That repo’s a second one too—identical code, busted ‘Download ZIP’ button. Same actor, A/B testing delivery. Smart. Ruthless.

But zoom out. This isn’t sloppy coding. It’s architectural. AI agents like Claude Code blur lines—dev tool, executor, system whisperer. Leaks expose not bugs, but design. Permissions baked in, execution flows. Hackers don’t need exploits; they need eyeballs. And boy, do they get ‘em.

Why Does GitHub Let This Happen—Again?

GitHub. Microsoft’s baby. Billions of lines, trusted hub. Yet, perennial malware vector. Disguised as PoCs, leaks, tools. Why? Scale. 100M+ repos. Human reviewers can’t keep up. Auto-tools flag signatures, miss Rust droppers in zips.

Devs trust it implicitly—fork, star, clone. No second thoughts. Add SEO trickery: repo names, descriptions stuffed with hot keywords. “Claude Code leak full source.” First page on Google. Boom.

A single sentence: GitHub’s the new phishing frontier.

And here’s my take—the unique bit no one’s yelling yet. This echoes Stuxnet’s air-gapped sneak: not brute force, but supply chain psychology. Anthropic’s leak? Like a USB in the parking lot. Curiosity kills. But for AI agents, it’s systemic. As these tools proliferate—Cursor, Aider, now Claude—leaks will train hackers on agent weak spots. Predict this: 2025 sees first agent-jacking malware, impersonating leaked agents to burrow deeper. Not stealing creds. Hijacking your AI to own your rig.

Corporate spin? Anthropic’s mum—classic. No post-mortem, just npm scrub. But why no client-side obfuscation? Enterprise tool, yet source maps shipped raw? Smells like rush-to-market, security as afterthought.

Look, devs: pause. Verify. SHA sums. Official channels. GitHub stars mean squat—bots inflate ‘em.

Is Vidar Just Noise, or Real Threat?

Vidar. Commodity stealer. Grabs creds, cookies, crypto wallets. Sells on underground markets. Not novel, but effective—millions infected historically. Paired with GhostSocks? Pivots your traffic, hides C2. Nasty.

Rust executable? Evades AV better. Cross-platform potential. Frequent updates scream active op. Zscaler warns: more payloads inbound.

Why care? Targets you—curious coders, AI tinkerers. Not randos. Your API keys, SSH, source repos. Compromised agent code runs wild.

Three words: Don’t. Download. Blindly.

Architectural shift underfoot. AI dev tools aren’t plugins anymore. They’re agents with teeth. Leaks like this preview the pain: not CVEs, but social supply chains. GitHub as lure farm. Anthropic’s oops? Canary in the coal mine for agent era security.

Skeptical? Test it. Search the term yourself. See the repo climb. That’s the how. The why? Human nature meets hype machine.


🧬 Related Insights

  • Read more:
  • Read more:

Frequently Asked Questions

What is the Claude Code leak exactly?

Anthropic accidentally bundled 513,000 lines of Claude Code’s TypeScript source in an npm package’s source map—exposing agent logic, permissions, and internals.

How does the GitHub malware scam work?

Fake repos top Google for “Claude Code leak,” offering downloads that drop Vidar infostealer via Rust exe in a 7-Zip archive.

Can I safely download Claude Code source now?

Stick to official Anthropic channels or verified forks—check hashes, scan zips, avoid hype-bait repos.

Elena Vasquez
Written by

Senior editor and generalist covering the biggest stories with a sharp, skeptical eye.

Frequently asked questions

What is the Claude Code leak exactly?
Anthropic accidentally bundled 513,000 lines of Claude Code's TypeScript source in an npm package's source map—exposing agent logic, permissions, and internals.
How does the GitHub malware scam work?
Fake repos top Google for "Claude Code leak," offering downloads that drop Vidar infostealer via Rust exe in a 7-Zip archive.
Can I safely download Claude Code source now?
Stick to official Anthropic channels or verified forks—check hashes, scan zips, avoid hype-bait repos.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by Bleeping Computer

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.