Claude Code --dangerously-skip-permissions vulnerability and open-source defense tool

Security vulnerability in Claude Code with --dangerously-skip-permissions
When using Claude Code with the --dangerously-skip-permissions flag, there's a documented indirect prompt injection vulnerability. The core issue: Claude processes untrusted content with trusted privileges and can't reliably distinguish between your instructions and malicious instructions embedded in that content.
Attack vectors documented by Lasso Security
- Hidden instructions in README or code comments of cloned repositories
- Malicious content in web pages Claude fetches for research
- Edited pages coming through MCP connectors (Notion, GitHub, Slack, etc.)
- Encoded payloads in Base64, homoglyphs, zero-width characters
The flag removes the human checkpoint that would normally catch suspicious activity, creating a significant attack surface when Claude reads files, fetches pages, or gets output from MCP servers.
Open-source defense tool
Lasso Security released a PostToolUse hook that scans tool outputs against 50+ detection patterns before Claude processes them. The tool warns rather than blocks outright to avoid false positives and maintain context. Setup takes about 5 minutes and works with both Python and TypeScript.
The tool is available on GitHub as claude-hooks and detailed in Lasso's blog post about the vulnerability.
📖 Read the full source: r/ClaudeAI
👀 See Also

Scam Alert: Fake GitHub Airdrop Targets CLAW Token Users
A phishing scam is circulating that claims to offer $CLAW token airdrops for GitHub contributions. The scam uses a Google share link that redirects to a suspicious .xyz site and asks users to connect their wallets, potentially leading to wallet draining.

Malwar: A Vulnerability Scanner for SKILL.md Files Built with Claude Code
A developer has released Malwar, a free tool that scans SKILL.md files for malicious instructions using a 4-layer pipeline including a rule engine, URL crawler, LLM analysis, and threat intel. The tool was built entirely with Claude Code after the developer found concerning patterns like Base64 blobs and instructions to pipe curl output to bash in existing skills.

Critical RCE vulnerability in protobuf.js library
A critical remote code execution vulnerability in protobuf.js versions 8.0.0/7.5.4 and lower allows JavaScript code execution through malicious schemas. Patches are available in versions 8.0.1 and 7.5.5.

Proxy-layer isolation for local agent API key security
A developer shares an approach to API key isolation in local agent setups using a Rust proxy that swaps placeholder tokens for real credentials, preventing exposure in agent memory, logs, context windows, and tool environments.