{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreigklveuncq3o7yoqeyvc2bs6dh6xdriod3glou564ixpgywzusyyi",
    "uri": "at://did:plc:gapzbf5nl5wxaqkqoecaeawh/app.bsky.feed.post/3mmilva5ring2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreig7w64xe7l4sedy4ey3iewtoqwznhjd7xk4byeqhmfg7edjfkfqxq"
    },
    "mimeType": "image/webp",
    "size": 32718
  },
  "path": "/attackers-can-exploit-a-claude-code-rce-flaw-to-take-command-of-system/",
  "publishedAt": "2026-05-22T21:10:58.000Z",
  "site": "https://devops.com",
  "tags": [
    "AI",
    "Blogs",
    "DevSecOps",
    "Features",
    "Identity and Access Management",
    "News",
    "Social - Facebook",
    "Social - LinkedIn",
    "Social - X",
    "agentic AI",
    "AI (Artificial Intelligence)",
    "AI security risks",
    "Anthropic Claude Code",
    "automated parsers",
    "deeplink"
  ],
  "textContent": "A dangerous vulnerability found in Anthropic’s popular Claude Code developer model could have allowed bad actors to grab control of a victim’s system by luring them into clicking on a crafted malicious deeplink. Once in, the attacker could exploit the remote code execution (RCE) security flaw to execute arbitrary commands – such as shell commands […]",
  "title": "Attackers Can Exploit a Claude Code RCE Flaw to Take Command of System"
}