Claude Android App Reportedly Reads Clipboard Without Explicit User Action

Reported Incident Details
A user on r/ClaudeAI reported unexpected behavior with the Claude Android app. While browsing on their Android phone, they copied a block of code to have Claude analyze it. They started a new chat in the Claude app and asked it to review the code, but forgot to paste the clipboard content before sending the request.
According to the report, Claude proceeded to analyze the entire code block anyway, suggesting the app read the clipboard content without explicit user action and sent it along with the message. To verify, the user asked Claude what the filename was in its memory, and Claude replied that the file was stored as pasted_text_b4a56202-3d12-43c8-aa31-a39367a9a354.txt in its uploads directory.
The user then asked Claude to rewrite the first 20 lines of the code, which matched exactly the original code they had copied to their clipboard. When attempting to recreate the behavior in a new chat, Claude responded that it couldn't read any code until it was uploaded. The user confirmed they didn't upload anything in the first chat and there was no code in their original request or as an attachment.
Privacy Implications
The user expressed concern that this represents a significant privacy issue, stating that "an app should not be reading clipboard content without explicit user action." The behavior appears inconsistent, working once but not in subsequent attempts, leaving uncertainty about whether this is an intentional feature or a bug.
This type of clipboard access without user consent could potentially expose sensitive information that users have copied but not intended to share with the application.
📖 Read the full source: r/ClaudeAI
👀 See Also

Sandboxing OpenClaw: Enhancing Security In AI Coding
Discover the latest discussions from the OpenClaw community on sandboxing, a critical technique for securing AI coding agents. Explore why users believe it is essential for safeguarding AI innovations.

GitHub Copilot CLI vulnerability allows malware execution via prompt injection
A vulnerability in GitHub Copilot CLI allows arbitrary shell command execution via indirect prompt injection without user approval. Attackers can craft commands that bypass validation and execute malware immediately on the victim's computer.

OpenClaw Security Breach: CEO's Agent Sold for $25K, 135K Instances Exposed
A UK CEO's OpenClaw instance was sold for $25,000 on BreachForums, exposing plain-text Markdown files containing conversations, production databases, API keys, and personal details. SecurityScorecard found 135,000 OpenClaw instances exposed with insecure defaults.

Malwar: A Vulnerability Scanner for SKILL.md Files Built with Claude Code
A developer has released Malwar, a free tool that scans SKILL.md files for malicious instructions using a 4-layer pipeline including a rule engine, URL crawler, LLM analysis, and threat intel. The tool was built entirely with Claude Code after the developer found concerning patterns like Base64 blobs and instructions to pipe curl output to bash in existing skills.