Anthropic's Computer-Use Feature Triggers Governance Lockdown in Real Test

What Happened
Anthropic released computer-use functionality. A developer was working inside a governed Claude Code session to add enforcement coverage for these new tools when the system entered LOCKDOWN mode.
Key Details from the Incident
The governance system tracks cumulative risk from denied operations. When this risk crossed 0.50, the system automatically escalated to LOCKDOWN posture with these effects:
- The session could still read files
- All write operations were blocked
- Mutating commands could not execute
- GitHub pushes were prevented
- The governance layer blocked its own operator from completing work that would have strengthened the governance system
Enforcement Mechanism
The LOCKDOWN is mechanically enforced by the hook system with these characteristics:
- No override channel exists
- The model cannot bypass the gate through conversation
- The operator cannot issue in-band exceptions
- The only recovery path requires stepping outside the session entirely
Resolution Process
To continue work, the developer had to:
- Exit the governed session
- Open a terminal on their local machine
- Push the commit manually
The system forced human intervention outside its jurisdiction, creating what the developer describes as "the difference between governance you describe and governance you enforce."
System Behavior Notes
The LOCKDOWN implementation does not degrade gracefully, does not ask for confirmation, and maintains the stopped state until human action occurs externally. The developer notes: "That refusal is the product."
📖 Read the full source: r/ClaudeAI
👀 See Also

Tool Authority Injection in LLM Agents: When Tool Output Overrides System Intent
A researcher demonstrates 'Tool Authority Injection' in a local LLM agent lab, showing how trusted tool output can be elevated to policy-level authority, silently changing agent behavior while sandbox and file access remain secure.

OpenClaw User Shares Strategy for Balancing Agent Autonomy and Web Security
An OpenClaw user describes their current challenge: balancing agent autonomy with security, particularly regarding web access and prompt injection risks. They propose a solution using 'low trust' and 'high trust' agent segments with a human approval gate.

Fake Claude Code site served trojan — detected by Windows Defender as Trojan:Win32/Kepavll!rfn
A typosquatting or ad-based site mimicking the official Claude Code website delivered a trojan detected as Trojan:Win32/Kepavll!rfn by Windows Defender. Reddit user warns others to verify URLs before running PowerShell install commands.

Critical OpenClaw Security Vulnerabilities Patched in 2026.3.28
OpenClaw version 2026.3.28 patches 8 critical security vulnerabilities found by Ant AI Security Lab, including sandbox bypass, privilege escalation, and SSRF risks. Users on versions ≤2026.3.24 should update immediately.