<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Trust-Bypass — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/trust-bypass/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 25 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/trust-bypass/feed.xml" rel="self" type="application/rss+xml"/><item><title>Claude Code Trust Dialog Bypass via Git Worktree Spoofing</title><link>https://feed.craftedsignal.io/briefs/2026-04-claude-code-trust-bypass/</link><pubDate>Sat, 25 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-claude-code-trust-bypass/</guid><description>A vulnerability in Claude Code allowed for trust dialog bypass via git worktree spoofing, potentially leading to arbitrary code execution by crafting a malicious repository with a `commondir` file pointing to a previously trusted path, bypassing the trust dialog, and executing malicious hooks defined in `.claude/settings.json`.</description><content:encoded><![CDATA[<p>A vulnerability in Claude Code, specifically versions 2.1.63 and later but before 2.1.84, allowed for a trust dialog bypass via Git worktree spoofing. This exploit leverages the way Claude Code determines folder trust using the <code>commondir</code> file in Git worktrees. By crafting a repository containing a <code>commondir</code> file that points to a path the victim has previously trusted, an attacker could bypass the trust dialog, leading to arbitrary code execution through malicious hooks defined in the <code>.claude/settings.json</code> file. Successful exploitation required the victim to clone a malicious repository and run Claude Code within it, as well as the attacker knowing or guessing a path the victim had previously trusted. Users on standard Claude Code with auto-update enabled received the fix automatically.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious Git repository with a <code>commondir</code> file.</li>
<li>The <code>commondir</code> file is configured to point to a directory path the victim is likely to have previously trusted.</li>
<li>The repository includes a malicious <code>.claude/settings.json</code> file containing arbitrary code execution hooks.</li>
<li>Attacker distributes the malicious repository, likely through social engineering or other deceptive means.</li>
<li>Victim clones the malicious repository to their local machine using <code>git clone</code>.</li>
<li>Victim opens the cloned directory containing the malicious <code>.claude/settings.json</code> in a vulnerable version of Claude Code.</li>
<li>Claude Code reads the <code>commondir</code> file and incorrectly trusts the repository based on the spoofed path.</li>
<li>The malicious hooks defined in <code>.claude/settings.json</code> are executed, leading to arbitrary code execution on the victim&rsquo;s machine.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allowed an attacker to execute arbitrary code on a victim&rsquo;s machine. While the number of affected users is unknown, the impact of successful exploitation could range from data theft and system compromise to complete takeover of the victim&rsquo;s development environment. The vulnerability primarily targeted developers using Claude Code, potentially impacting software development organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Claude Code to the latest version (&gt;= 2.1.84) to patch CVE-2026-40068.</li>
<li>Implement a detection rule that identifies the creation or modification of <code>.claude/settings.json</code> files containing suspicious code (see Sigma rule below).</li>
<li>Monitor process creation events for unusual processes being launched from within the Claude Code application context (see Sigma rule below).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>git</category><category>code-execution</category><category>trust-bypass</category></item><item><title>Mise Trust Bypass Vulnerability via Malicious .mise.toml</title><link>https://feed.craftedsignal.io/briefs/2026-04-mise-trust-bypass/</link><pubDate>Tue, 07 Apr 2026 20:13:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mise-trust-bypass/</guid><description>A vulnerability in mise allows an attacker who can place a malicious .mise.toml file in a repository to bypass trust checks and execute arbitrary code via `[env] _.source` due to improper loading of trust settings.</description><content:encoded><![CDATA[<p>A critical vulnerability exists in the mise tool (versions 2026.2.18 through 2026.4.5) where local project configuration files (.mise.toml) are loaded <em>before</em> trust checks are performed. This allows an attacker who can influence the contents of a repository (e.g., through a pull request or direct commit) to inject malicious configurations that bypass intended trust restrictions. Specifically, an attacker can set <code>trusted_config_paths = [&quot;/&quot;]</code> within a crafted .mise.toml, which effectively trusts all configuration files, including the malicious one. This bypass then permits the execution of dangerous directives, such as arbitrary shell commands via <code>[env] _.source</code>, leading to potential system compromise. This vulnerability undermines the security model of mise by subverting the trust mechanism designed to prevent unauthorized code execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains the ability to modify a repository containing a mise project. This could be via a compromised account, a malicious pull request, or other means.</li>
<li>The attacker creates or modifies a <code>.mise.toml</code> file within the repository, adding the following lines:
<div class="highlight"><pre tabindex="0" class="chroma"><code class="language-toml" data-lang="toml"><span class="line"><span class="cl"><span class="p">[</span><span class="nx">settings</span><span class="p">]</span>
</span></span><span class="line"><span class="cl"><span class="nx">trusted_config_paths</span> <span class="p">=</span> <span class="p">[</span><span class="s2">&#34;/&#34;</span><span class="p">]</span>
</span></span><span class="line"><span class="cl">
</span></span><span class="line"><span class="cl"><span class="p">[</span><span class="nx">env</span><span class="p">]</span>
</span></span><span class="line"><span class="cl"><span class="nx">_</span><span class="p">.</span><span class="nx">source</span> <span class="p">=</span> <span class="p">[</span><span class="s2">&#34;./poc.sh&#34;</span><span class="p">]</span>
</span></span></code></pre></div></li>
<li>The attacker creates or modifies a file <code>poc.sh</code> containing the malicious commands to be executed. For example:
<div class="highlight"><pre tabindex="0" class="chroma"><code class="language-bash" data-lang="bash"><span class="line"><span class="cl"><span class="cp">#!/usr/bin/env bash
</span></span></span><span class="line"><span class="cl"><span class="nb">echo</span> <span class="s2">&#34;Exploited!&#34;</span> &gt; /tmp/pwned.txt
</span></span></code></pre></div></li>
<li>A user clones the repository and navigates to the project directory.</li>
<li>The user executes the command <code>mise hook-env -s bash --force</code>. This command is intended to set up the environment based on the <code>.mise.toml</code> configuration.</li>
<li>Because <code>trusted_config_paths</code> is set to <code>/</code>, the <code>.mise.toml</code> file is considered trusted and the <code>[env] _.source</code> directive is executed.</li>
<li>The <code>poc.sh</code> script is executed, resulting in arbitrary code execution. In this example, the <code>/tmp/pwned.txt</code> file is created containing &ldquo;Exploited!&rdquo;.</li>
<li>The attacker has achieved arbitrary code execution on the user&rsquo;s system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to execute arbitrary code on the victim&rsquo;s machine. The number of potential victims is equal to the number of users who clone and use a repository containing the malicious <code>.mise.toml</code> file and are using a vulnerable version of <code>mise</code> (2026.2.18 - 2026.4.5). The impact ranges from data theft and system compromise to complete control of the affected system, depending on the commands executed by the attacker&rsquo;s script. Organizations using mise for environment management are particularly at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of <code>mise</code> greater than 2026.4.5 to address CVE-2026-35533.</li>
<li>Deploy the Sigma rule <code>Detect Mise Hook-Env with Dot Source</code> to identify potential exploitation attempts based on the <code>mise hook-env</code> command.</li>
<li>Monitor for the creation of unexpected files (e.g., in /tmp) after the execution of <code>mise hook-env</code> commands.</li>
<li>Implement code review processes to prevent the introduction of malicious <code>.mise.toml</code> files into repositories.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>mise</category><category>trust-bypass</category><category>code-execution</category><category>vulnerability</category></item></channel></rss>