<?xml version="1.0" encoding="UTF-8"?><feed
	xmlns="http://www.w3.org/2005/Atom"
	xmlns:thr="http://purl.org/syndication/thread/1.0"
	xml:lang="en-US"
	>
	<title type="text">Security | The Verge</title>
	<subtitle type="text">The Verge is about technology and how it makes us feel. Founded in 2011, we offer our audience everything from breaking news to reviews to award-winning features and investigations, on our site, in video, and in podcasts.</subtitle>

	<updated>2026-05-01T16:55:16+00:00</updated>

	<link rel="alternate" type="text/html" href="https://www.theverge.com/cyber-security" />
	<id>https://www.theverge.com/rss/cyber-security/index.xml</id>
	<link rel="self" type="application/atom+xml" href="https://www.theverge.com/rss/cyber-security/index.xml" />

	<icon>https://platform.theverge.com/wp-content/uploads/sites/2/2025/01/verge-rss-large_80b47e.png?w=150&amp;h=150&amp;crop=1</icon>
		<entry>
			
			<author>
				<name>Stevie Bonifield</name>
			</author>
			
			<title type="html"><![CDATA[Severe Linux Copy Fail security flaw uncovered using AI scanning help]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/tech/922243/linux-cve-2026-3141-copy-fail-exploit" />
			<id>https://www.theverge.com/?p=922243</id>
			<updated>2026-05-01T12:55:16-04:00</updated>
			<published>2026-05-01T12:55:16-04:00</published>
			<category scheme="https://www.theverge.com" term="Linux" /><category scheme="https://www.theverge.com" term="News" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Nearly every Linux distribution released since 2017 is currently vulnerable to a security bug called "Copy Fail" that allows any user to give themselves administrator privileges. The exploit, publicly disclosed as CVE-2026-31431 on Wednesday, uses a Python script that works across all of the vulnerable Linux distributions, requiring "no per-distro offsets, no version checks, no [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="Devil face on a computer motherboard." data-caption="" data-portal-copyright="Image: Cath Virginia / The Verge, Getty Images" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/2025/09/STK414_AI_CVIRGINIA_I__0008_6.png?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p class="has-text-align-none">Nearly every Linux distribution released since 2017 is currently vulnerable to a security bug called "Copy Fail" that allows any user to give themselves administrator privileges.  The exploit, <a href="https://copy.fail/">publicly disclosed</a> as CVE-2026-31431 on Wednesday, uses a Python script that works across all of the vulnerable Linux distributions, requiring "no per-distro offsets, no version checks, no recompilation," according to Theori, the security firm that uncovered it. </p>
<p class="has-text-align-none"><a href="https://arstechnica.com/security/2026/04/as-the-most-severe-linux-threat-in-years-surfaces-the-world-scrambles/"><em>Ars Technica</em></a> points out this blog post where DevOps engineer Jorijn Schrijvershof <a href="https://jorijn.com/en/blog/copy-fail-cve-2026-31431-linux-kernel-bug-explained/">explains</a> that what makes Copy Fail "unusually nasty" is the likelihood for it to go unnoticed by monitoring t …</p>
<p><a href="https://www.theverge.com/tech/922243/linux-cve-2026-3141-copy-fail-exploit">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Tom Warren</name>
			</author>
			
			<title type="html"><![CDATA[GitHub rushed to fix a critical vulnerability in less than six hours]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/news/920295/github-remote-code-execution-vulnerability-fix" />
			<id>https://www.theverge.com/?p=920295</id>
			<updated>2026-04-29T06:15:23-04:00</updated>
			<published>2026-04-29T06:04:25-04:00</published>
			<category scheme="https://www.theverge.com" term="AI" /><category scheme="https://www.theverge.com" term="Microsoft" /><category scheme="https://www.theverge.com" term="News" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[GitHub employees fixed a critical remote code execution vulnerability in less than six hours last month. Wiz Research used AI models to uncover a vulnerability in GitHub's internal git infrastructure that could have allowed attackers to access millions of public and private code repositories. "Our security team immediately began validating the bug bounty report. Within [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="An illustration of the GitHub logo" data-caption="" data-portal-copyright="Image: Alex Castro / The Verge" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/2025/10/acastro_220504_STK121_0001.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p class="has-text-align-none">GitHub employees fixed a critical remote code execution vulnerability in less than six hours last month. <a href="https://www.wiz.io/blog/github-rce-vulnerability-cve-2026-3854">Wiz Research used</a> AI models to uncover a vulnerability in GitHub's internal git infrastructure that could have allowed attackers to access millions of public and private code repositories.</p>
<p class="has-text-align-none">"Our security team immediately began validating the bug bounty report. Within 40 minutes, we had reproduced the vulnerability internally and confirmed the severity," <a href="https://github.blog/security/securing-the-git-push-pipeline-responding-to-a-critical-remote-code-execution-vulnerability/">explains Alexis Wales</a>, GitHub chief information security officer. "This was a critical issue that required immediate action."</p>
<p class="has-text-align-none">GitHub's engineering team developed a fix and deployed it jus …</p>
<p><a href="https://www.theverge.com/news/920295/github-remote-code-execution-vulnerability-fix">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Yael Grauer</name>
			</author>
			
			<title type="html"><![CDATA[Attack of the killer script kiddies]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/ai-artificial-intelligence/915660/mythos-script-kiddies-hackers-attack-cybersecurity-ai" />
			<id>https://www.theverge.com/?p=915660</id>
			<updated>2026-04-28T08:29:07-04:00</updated>
			<published>2026-04-28T07:00:00-04:00</published>
			<category scheme="https://www.theverge.com" term="AI" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Last August, some of the best cybersecurity teams in the business gathered in Las Vegas to demonstrate the strength of their AI bug-finding systems at DARPA's Artificial Intelligence Cyber Challenge (AIxCC). The tools had scanned 54 million lines of actual software code that DARPA had injected with artificial flaws. The teams were capable enough to [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Joseph Rogers / The Verge" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/2026/04/rogers-script-kiddies-ANIMATION.gif?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p class="has-drop-cap has-text-align-none">Last August, some of the best cybersecurity teams in the business gathered in Las Vegas to demonstrate the strength of their AI bug-finding systems at DARPA's Artificial Intelligence Cyber Challenge (AIxCC). The tools had scanned 54 million lines of actual software code that DARPA had injected with artificial flaws. The teams were capable enough to identify most of the artificial bugs, but their automated tools went beyond that - they found more than a dozen bugs that DARPA hadn't inserted at all.</p>
<p class="has-text-align-none">Even before the security earthquake that Anthropic delivered this month with Claude Mythos - the new AI model that seems to find vulnerabilities  …</p>
<p><a href="https://www.theverge.com/ai-artificial-intelligence/915660/mythos-script-kiddies-hackers-attack-cybersecurity-ai">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Robert Hart</name>
			</author>
			
			<title type="html"><![CDATA[Anthropic&#8217;s Mythos breach was humiliating]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/ai-artificial-intelligence/917644/anthropic-claude-mythos-breach-humiliation" />
			<id>https://www.theverge.com/?p=917644</id>
			<updated>2026-04-23T14:24:56-04:00</updated>
			<published>2026-04-23T14:24:56-04:00</published>
			<category scheme="https://www.theverge.com" term="AI" /><category scheme="https://www.theverge.com" term="Anthropic" /><category scheme="https://www.theverge.com" term="Report" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Anthropic's tightly controlled rollout of Claude Mythos has taken an awkward turn. After spending weeks insisting the AI model is so capable at cybersecurity that it is too dangerous to release publicly, it appears the model fell into the wrong hands anyway. According to Bloomberg, a "small group of unauthorized users" has had access to [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="A number of cursors point toward an unhappy face on a laptop" data-caption="" data-portal-copyright="Photo by Amelia Holowaty Krales / The Verge" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/23318433/akrales_220309_4977_0182.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p class="has-text-align-none">Anthropic's tightly controlled rollout of Claude Mythos has taken an awkward turn. After spending weeks insisting the AI model is so capable at cybersecurity that it is too dangerous to release publicly, it appears the model <a href="https://www.theverge.com/ai-artificial-intelligence/916501/anthropic-mythos-unauthorized-users-access-security">fell into the wrong hands</a> anyway. </p>
<p class="has-text-align-none"><a href="https://www.bloomberg.com/news/articles/2026-04-21/anthropic-s-mythos-model-is-being-accessed-by-unauthorized-users">According to <em>Bloomberg</em></a>, a "small group of unauthorized users" has had access to Mythos - whose <a href="https://www.theverge.com/ai-artificial-intelligence/902272/anthropics-apparent-security-lapse-yielded-details-of-its-next-model-release">existence</a> was first <a href="https://www.theverge.com/ai-artificial-intelligence/902272/anthropics-apparent-security-lapse-yielded-details-of-its-next-model-release">revealed</a> in a leak - since the day Anthropic announced <a href="https://www.theverge.com/ai-artificial-intelligence/908114/anthropic-project-glasswing-cybersecurity">plans</a> to offer it to a select group of companies for testing. Anthropic says it is investigating. That's a rough look for a company that has built its brand on taking AI safety seriously while touting the cybersecurity …</p>
<p><a href="https://www.theverge.com/ai-artificial-intelligence/917644/anthropic-claude-mythos-breach-humiliation">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Lauren Feiner</name>
			</author>
			
			<title type="html"><![CDATA[Anthropic&#8217;s Mythos rollout has missed America’s cybersecurity agency]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/policy/916758/anthropic-mythos-preview-cisa-left-out" />
			<id>https://www.theverge.com/?p=916758</id>
			<updated>2026-04-22T13:12:21-04:00</updated>
			<published>2026-04-22T12:57:36-04:00</published>
			<category scheme="https://www.theverge.com" term="AI" /><category scheme="https://www.theverge.com" term="Anthropic" /><category scheme="https://www.theverge.com" term="Policy" /><category scheme="https://www.theverge.com" term="Politics" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Several US federal agencies are taking up Anthropic's new cybersecurity model to find vulnerabilities, but one is reportedly not getting in on the action: the nation's central cybersecurity coordinator. On Tuesday, Axios reported that the Cybersecurity and Infrastructure Security Agency (CISA) didn't have access to Mythos Preview, which Anthropic has touted as a powerful tool [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/2026/04/STK269_ANTHROPIC_2_D.webp?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p class="has-text-align-none">Several US federal agencies are taking up Anthropic's new cybersecurity model to find vulnerabilities, but one is reportedly not getting in on the action: the nation's central cybersecurity coordinator. </p>
<p class="has-text-align-none">On Tuesday, <a href="https://www.axios.com/2026/04/21/cisa-anthropic-mythos-ai-security"><em>Axios </em>reported</a> that the Cybersecurity and Infrastructure Security Agency (CISA) didn't have access to Mythos Preview, which Anthropic has touted as a powerful tool for finding and patching security vulnerabilities. Meanwhile, other agencies like <a href="https://www.politico.com/news/2026/04/14/anthropic-mythos-federal-agency-testing-00872439">Commerce Department</a> and <a href="https://www.axios.com/2026/04/19/nsa-anthropic-mythos-pentagon">National Security Agency (NSA)</a> are reportedly using the model, and President Donald Trump's administration has been negotiating broader access, <a href="https://www.axios.com/2026/04/16/white-house-anthropic-ai-mythos-government-national-security"><em>Axios</em> wrote</a> last w …</p>
<p><a href="https://www.theverge.com/policy/916758/anthropic-mythos-preview-cisa-left-out">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Jess Weatherbed</name>
			</author>
			
			<title type="html"><![CDATA[Anthropic’s most dangerous AI model just fell into the wrong hands]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/ai-artificial-intelligence/916501/anthropic-mythos-unauthorized-users-access-security" />
			<id>https://www.theverge.com/?p=916501</id>
			<updated>2026-04-22T05:30:13-04:00</updated>
			<published>2026-04-22T05:18:40-04:00</published>
			<category scheme="https://www.theverge.com" term="AI" /><category scheme="https://www.theverge.com" term="Anthropic" /><category scheme="https://www.theverge.com" term="News" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Anthropic's Mythos AI model, a powerful cybersecurity tool that the company said could be dangerous in the wrong hands, has been accessed by a "small group of unauthorized users," Bloomberg reports. An unnamed member of the group, identified only as "a third-party contractor for Anthropic," told the publication that members of a private online forum [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="Vector illustration of the Anthropic logo." data-caption="" data-portal-copyright="Image: The Verge" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/25469782/STK269_ANTHROPIC_D.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p class="has-text-align-none">Anthropic's Mythos AI model, a powerful cybersecurity tool that the company said could be dangerous in the wrong hands, has been accessed by a "small group of unauthorized users," <a href="https://www.bloomberg.com/news/articles/2026-04-21/anthropic-s-mythos-model-is-being-accessed-by-unauthorized-users"><em>Bloomberg</em></a> reports. An unnamed member of the group, identified only as "a third-party contractor for Anthropic," told the publication that members of a private online forum got into Mythos via a mix of tactics, utilizing the contractor's access and "commonly used internet sleuthing tools."</p>
<p class="has-text-align-none">The Claude Mythos Preview is a new general-purpose model that's capable of identifying and exploiting vulnerabilities "in every major operating system and every major web browser …</p>
<p><a href="https://www.theverge.com/ai-artificial-intelligence/916501/anthropic-mythos-unauthorized-users-access-security">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Terrence O’Brien</name>
			</author>
			
			<title type="html"><![CDATA[Cloud development platform Vercel was hacked]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/tech/914723/vercel-hacked" />
			<id>https://www.theverge.com/?p=914723</id>
			<updated>2026-04-20T05:41:50-04:00</updated>
			<published>2026-04-19T15:54:52-04:00</published>
			<category scheme="https://www.theverge.com" term="AI" /><category scheme="https://www.theverge.com" term="News" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Vercel, a major development platform that hosts and deploys web apps, was compromised, and the hackers are attempting to sell stolen data. A person claiming to be a member of ShinyHunters, which was behind the recent hack of Rockstar Games, posted some data online, including employee names, email addresses, and activity time stamps. Vercel confirmed [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="Vercel homepage with the tagline “build and deploy on the AI cloud”" data-caption="" data-portal-copyright="Screenshot: The Verge" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/2026/04/Screenshot-2026-04-19-at-3.53.46PM.png?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p class="has-text-align-none">Vercel, a major development platform that hosts and deploys web apps, was compromised, and the hackers are attempting to sell stolen data. A person claiming to be a member of <a href="https://www.bleepingcomputer.com/news/security/vercel-confirms-breach-as-hackers-claim-to-be-selling-stolen-data/amp/">ShinyHunters</a>, which was behind the recent hack of <a href="https://www.theverge.com/games/910815/rockstar-games-says-hack-will-have-no-impact">Rockstar Games</a>, posted some data online, including employee names, email addresses, and activity time stamps. Vercel confirmed in a post on X that a "security incident" had occurred, and that it impacted a "limited subset" of its customers. Vercel said that a compromised third-party AI tool was the avenue for attack, though it did not specify which third party was involved.</p>
<figure class="wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter"><div class="wp-block-embed__wrapper">
<blockquote class="twitter-tweet" data-dnt="true"><p lang="en" dir="ltr">We've identified a security incident that inv …</p></blockquote></div></figure>
<p><a href="https://www.theverge.com/tech/914723/vercel-hacked">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Terrence O’Brien</name>
			</author>
			
			<title type="html"><![CDATA[Rockstar Games says hack will have ‘no impact’]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/games/910815/rockstar-games-says-hack-will-have-no-impact" />
			<id>https://www.theverge.com/?p=910815</id>
			<updated>2026-04-12T13:02:24-04:00</updated>
			<published>2026-04-12T13:02:00-04:00</published>
			<category scheme="https://www.theverge.com" term="Gaming" /><category scheme="https://www.theverge.com" term="News" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Rockstar confirmed on Saturday that some of its data was compromised in a breach of a third-party provider. The group ShinyHunters claimed responsibility, saying it had gained access to the company's Snowflake instances (a cloud-hosting provider popular with enterprise customers) via Anodot, a cost-monitoring and analytics service. The group is demanding a ransom by April [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="A promotional image for Grand Theft Auto VI with a beach in the background." data-caption="" data-portal-copyright="Image: Rockstar Games" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/2025/10/Jason_and_Lucia_02_With_Logos_landscape.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p class="has-text-align-none">Rockstar confirmed on Saturday that some of its data was compromised in a breach of a third-party provider. The group <a href="https://hackread.com/shinyhunters-rockstar-games-snowflake-breach-anodot/">ShinyHunters</a> claimed responsibility, saying it had gained access to the company's Snowflake instances (a cloud-hosting provider popular with enterprise customers) via Anodot, a cost-monitoring and analytics service. The group is demanding a ransom by April 14th, or it will leak the data it has stolen.</p>
<p class="has-text-align-none">In a statement provided to <em><a href="https://kotaku.com/rockstar-games-reportedly-hacked-massive-data-leak-ransom-gta-6-shinyhunters-2000686858">Kotaku</a>,</em> the company said that the compromised data was limited in scope and "this incident has no impact on our organization or our players." </p>
<p class="has-text-align-none">It's unclear exactly which data was compromised, but it  …</p>
<p><a href="https://www.theverge.com/games/910815/rockstar-games-says-hack-will-have-no-impact">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Emma Roth</name>
			</author>
			
			<title type="html"><![CDATA[PSA: Anyone with a link can view your Granola notes by default]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/ai-artificial-intelligence/906253/granola-note-links-ai-training-psa" />
			<id>https://www.theverge.com/?p=906253</id>
			<updated>2026-04-03T10:48:59-04:00</updated>
			<published>2026-04-02T17:56:16-04:00</published>
			<category scheme="https://www.theverge.com" term="AI" /><category scheme="https://www.theverge.com" term="Apps" /><category scheme="https://www.theverge.com" term="News" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[If you use the AI-powered note-taking app Granola, you might want to double-check your privacy settings. Though Granola says your notes are "private by default," it makes them viewable to anyone with a link, and also uses them for internal AI training unless you opt out. Granola describes itself as an "AI notepad for people [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="Granola logo on a yellow background." data-caption="" data-portal-copyright="Image: Granola" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/2026/04/granola-logo.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p class="has-text-align-none">If you use the AI-powered note-taking app Granola, you might want to double-check your privacy settings. Though <a href="https://www.granola.ai/security">Granola says</a> your notes are "private by default," it makes them viewable to anyone with a link, and also uses them for internal AI training unless you opt out.</p>
<p class="has-text-align-none">Granola <a href="https://www.granola.ai/">describes itself</a> as an "AI notepad for people in back-to-back meetings." It integrates with your calendar to capture audio from your meetings, and then uses AI to generate a bulleted list of what you've heard, which it calls a "note." You can edit the AI-generated notes, invite other collaborators to view them, and use Granola's AI assistant to ask questions about y …</p>
<p><a href="https://www.theverge.com/ai-artificial-intelligence/906253/granola-note-links-ai-training-psa">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Emma Roth</name>
			</author>
			
			<title type="html"><![CDATA[Claude Code leak exposes a Tamagotchi-style ‘pet’ and an always-on agent]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/ai-artificial-intelligence/904776/anthropic-claude-source-code-leak" />
			<id>https://www.theverge.com/?p=904776</id>
			<updated>2026-03-31T18:24:19-04:00</updated>
			<published>2026-03-31T18:24:19-04:00</published>
			<category scheme="https://www.theverge.com" term="AI" /><category scheme="https://www.theverge.com" term="Anthropic" /><category scheme="https://www.theverge.com" term="News" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[After Anthropic released Claude Code's 2.1.88 update, users quickly discovered that it contained a package with a source map file containing its TypeScript codebase, with one person on X calling attention to the leak and posting a file containing the code. The leaked data reportedly contains more than 512,000 lines of code and provides a [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="The Claude logo on a beige background." data-caption="" data-portal-copyright="Image: The Verge" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/2025/08/STKB364_CLAUDE_D.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p class="has-text-align-none">After Anthropic released Claude Code's <a href="https://x.com/ClaudeCodeLog/status/2038773096379748786?s=20">2.1.88 update</a>, users quickly discovered that it contained a package with a source map file containing its TypeScript codebase, with one <a href="https://x.com/Fried_rice/status/2038894956459290963?s=20">person on X</a> calling attention to the leak and posting a file containing the code. The leaked data reportedly contains more than 512,000 lines of code and provides a look into the inner workings of the AI-powered coding tool, as <a href="https://arstechnica.com/ai/2026/03/entire-claude-code-cli-source-code-leaks-thanks-to-exposed-map-file/">reported earlier by <em>Ars Technica</em></a> and <a href="https://venturebeat.com/technology/claude-codes-source-code-appears-to-have-leaked-heres-what-we-know"><em>VentureBeat</em></a>.</p>
<p class="has-text-align-none">Users <a href="https://x.com/vineetwts/status/2038911973975601275?s=20">who have dug into</a> the code claim to have uncovered upcoming features, Anthropic's <a href="https://x.com/vedolos/status/2038977464840630611?s=20">instructions for the AI bot</a>, and insight into its <a href="https://x.com/himanshustwts/status/2038924027411222533">"memory" architecture</a>. Some things spotted by users inclu …</p>
<p><a href="https://www.theverge.com/ai-artificial-intelligence/904776/anthropic-claude-source-code-leak">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
	</feed>
