A dangerous vulnerability found in Anthropic’s popular Claude Code developer model could have allowed bad actors to grab control of a victim’s system by luring them into clicking on a crafted malicious deeplink. Once in, the attacker could exploit the remote code execution (RCE) security flaw to execute arbitrary commands – such as shell commands – into the target’s Claude Code model. The vulnerability in version 2.1.118 of the model has since been fixed, but it’s another example of the security issues in these developer-focused tools that arise as adoption accelerates. A survey of more than 1,000 developers around the world by CodeSignal, which offers an AI-native skills platform to assess and develop technical talent, found that 81% of respondents said they’re using AI for development, with companies increasingly mandating the use of coding assistants. The RCE vulnerability in Claude Code was uncovered by security researcher Joernchen of 0day.click as he manually worked through...
The moment you push your code, deployment fires off on its own. The pipeline kicks in, the tests sail through, and within a few minutes your app is live in production. There is no manual sign-off and no one scanning through the final changes. Everything is running on the decisions of an AI agent plugged straight into the pipeline. At first it feels great. Stuff moves faster. That long stretch from development to live is just a sprint now. Teams get hooked because it slashes delays and smooths over all the bottlenecks everyone used to grumble about. And for a while it just works. Then things start to drift. Maybe there is a small config tweak made by the agent that changes how a service handles heavy loads. The tests pass, but in production it acts odd. Nothing explodes. No alarms go off. But users start to feel tiny delays here and there. The system is up yet something is definitely off. By the time somebody really figures out what happened, that change is baked into every environm...