Anthropic Claude Code Source Leak — RCE via AI Agent Project Hooks
Anthropic Claude Code Source Leak and RCE Hook
Confidence: High
A significant intelligence breach has been confirmed following the accidental release of the full source code for Anthropic's Claude Code (59.8 MB) onto the public npm registry. Analysis of the leaked repository reveals that the agent’s project-level configuration file, .claude/settings.json, can be weaponised to execute arbitrary commands or exfiltrate environment variables.
This vulnerability allows a malicious actor to commit a repository containing a crafted settings file; when an unsuspecting developer runs Claude Code within that directory, the agent will execute the attacker-defined hooks. This poses an immediate risk to any organisation using AI-assisted development tools without strict repository vetting and execution sandboxing.
Cisco IMC Remote Root Access (CVE-2026-20093)
Confidence: High
A critical authentication bypass vulnerability (CVE-2026-20093, CVSS 9.8) has been disclosed in the Cisco Integrated Management Controller (IMC). This flaw allows a remote, unauthenticated attacker to gain full root-level access to the server management interface.
Given that IMC is used for the management and monitoring of Cisco UCS C-Series Rack Servers and S-Series Storage Servers, this exposure provides a direct path to the underlying hardware and potentially the guest virtual machines. Organisations must apply the urgent firmware update or isolate management interfaces from the public internet immediately.
Nginx UI Unauthenticated Takeover (CVE-2026-33032)
Confidence: High
The Nginx UI management interface is subject to a critical unauthenticated service takeover (CVE-2026-33032, CVSS 9.8). This vulnerability allows a remote attacker to assume administrative control of the Nginx configuration, enabling traffic interception, certificate theft, and the deployment of malicious proxy rules.
As there is currently no official patch available from the maintainer, remediation is limited to network-level isolation or the complete removal of the Nginx UI component. This represents a severe risk to web infrastructure relying on this tool for configuration management.
Azure AKS Privilege Escalation (CVE-2026-33105)
Confidence: High
A critical privilege escalation vulnerability (CVE-2026-33105, CVSS 10.0) has been identified in the Azure Kubernetes Service (AKS). This flaw allows an attacker with limited access to a cluster node to escalate privileges to cluster administrator, effectively gaining control over all workloads and secrets within the environment.
APT29 GRAPELOADER Campaign
Confidence: High
The Russian SVR-nexus group APT29 has deployed a new malware family, dubbed GRAPELOADER, in a targeted campaign against European diplomats. The group is utilising sophisticated wine-tasting invitation lures to deliver the payload. This activity underscores a shift in APT29’s TTPs toward more culturally specific social engineering tactics within the EU diplomatic sphere.
Update: LiteLLM / Mercor AI 4TB Breach
Confidence: High
Update: The Mercor AI breach has been confirmed as a 4TB data loss. Furthermore, CERT-EU has identified 92GB of stolen data affecting 30 European entities, traced back to a compromised Trivy scanner in the LiteLLM supply chain.
Update: F5 BIG-IP 9.8 RCE (CVE-2025-53521)
Confidence: High
Update: CVE-2025-53521 has been upgraded to a 9.8 CVSS unauthenticated RCE. Active exploitation is widespread; immediate patching to version 21.0.0 or equivalent fixed releases is mandatory for all F5 BIG-IP APM users.
Update: Axios npm North Korea Attribution
Confidence: High
Update: The Axios npm package hijack has been definitively attributed to the North Korean state actor UNC1069. The attack delivered the WAVESHAPER.V2 RAT, targeting developer environments for credential theft.
Why This Matters
The weaponisation of AI agent infrastructure (Claude Code, Nginx UI, LiteLLM) indicates a new frontier in supply chain attacks. Developers are now primary targets for unauthenticated RCE via the tools designed to assist them, whilst critical management interfaces (Cisco IMC, F5) remain under intense unauthenticated exploitation.
- Recommended Actions
- Audit all local .claude/ directories and avoid running AI agents in unvetted repositories.
- Patch Cisco IMC (CVE-2026-20093) and F5 BIG-IP (CVE-2025-53521) management interfaces immediately.
- Isolate Nginx UI instances (CVE-2026-33032) behind a firewall or VPN until a patch is released.
- Verify Azure AKS configurations and apply relevant security updates for CVE-2026-33105.
All findings grounded in A13E intelligence sweeps through 04:30 UTC 04 April 2026.