<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Claude — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/claude/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 Apr 2026 20:16:25 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/claude/feed.xml" rel="self" type="application/rss+xml"/><item><title>Anthropic Claude Code CLI/SDK OS Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-claude-command-injection/</link><pubDate>Mon, 06 Apr 2026 20:16:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-claude-command-injection/</guid><description>CVE-2026-35022 describes an OS command injection vulnerability in the Anthropic Claude Code CLI and Claude Agent SDK that allows attackers with control over authentication settings to execute arbitrary commands, potentially leading to credential theft and environment variable exfiltration.</description><content:encoded><![CDATA[<p>The Anthropic Claude Code CLI and Claude Agent SDK are vulnerable to OS command injection (CVE-2026-35022). This vulnerability stems from the insecure execution of authentication helper configuration values. Specifically, the application executes commands using <code>shell=true</code> without proper input validation on parameters such as <code>apiKeyHelper</code>, <code>awsAuthRefresh</code>, <code>awsCredentialExport</code>, and <code>gcpAuthRefresh</code>. An attacker who can manipulate these authentication settings can inject shell metacharacters to execute arbitrary commands with the privileges of the user or automation environment running the Claude CLI or SDK. This can lead to credential theft and the exfiltration of sensitive environment variables. Defenders should focus on detecting attempts to modify authentication settings or the execution of commands originating from the Claude CLI or SDK with suspicious arguments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to the configuration settings of the Anthropic Claude Code CLI or Claude Agent SDK. This could be achieved through compromised credentials or a separate vulnerability.</li>
<li>The attacker modifies the <code>apiKeyHelper</code>, <code>awsAuthRefresh</code>, <code>awsCredentialExport</code>, or <code>gcpAuthRefresh</code> parameters within the authentication configuration.</li>
<li>The attacker injects shell metacharacters (e.g., <code>;</code>, <code>|</code>, <code>&amp;&amp;</code>) into these parameters, crafting malicious commands.</li>
<li>The Claude CLI or SDK attempts to authenticate, executing the configured helper command using <code>shell=true</code>.</li>
<li>The injected shell metacharacters cause the operating system to execute the attacker&rsquo;s malicious commands.</li>
<li>The attacker&rsquo;s commands steal credentials stored on the system.</li>
<li>The attacker&rsquo;s commands exfiltrate sensitive environment variables to an external server.</li>
<li>The attacker uses the stolen credentials and environment variables to gain further access to the victim&rsquo;s systems or data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-35022 allows attackers to execute arbitrary commands on the system running the Anthropic Claude Code CLI or Claude Agent SDK. This can lead to the theft of sensitive credentials, such as API keys and AWS credentials, and the exfiltration of environment variables containing sensitive information. The impact includes unauthorized access to cloud resources, data breaches, and potential supply chain compromise if the compromised environment is used for software development or deployment. The scope of the impact depends on the permissions of the user or automation environment running the vulnerable software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process execution for suspicious commands originating from the Claude CLI or SDK with command-line arguments containing shell metacharacters. Implement the Sigma rule &ldquo;Detect Claude CLI/SDK Command Injection via Shell Metacharacters&rdquo;.</li>
<li>Implement strict access control policies to limit who can modify the configuration settings of the Claude CLI or SDK.</li>
<li>Regularly audit the configuration settings of the Claude CLI or SDK for any unauthorized changes.</li>
<li>Patch CVE-2026-35022 as soon as a patch is available from Anthropic.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>cve-2026-35022</category><category>anthropic</category><category>claude</category></item></channel></rss>