No sensitive customer data or credentials were involved or exposed. This was a release packaging issue caused by human error, not a security breach. This statement from an Anthropic spokesperson underscores the gravity of the recent leak of the Claude Code source code.
The incident, which occurred on March 31, 2026, revealed approximately 500,000 lines of code across 1,900 files. The leak happened when Anthropic mistakenly uploaded the entire original code to NPM instead of just the finalized version.
While the company has confirmed that no sensitive information was compromised, the exposure of such a substantial amount of code raises concerns about potential reverse-engineering by competitors. The leak has been described as more damaging than a previous incident involving a draft blog post.
Roy Paz, a tech analyst, remarked, “Usually, large companies have strict processes and multiple checks before code reaches production, like a vault requiring several keys to open.” This highlights the unexpected nature of the leak, attributed to a misconfiguration.
The leaked code includes features such as a multi-agent coordinator and a virtual pet system, as well as a mode codenamed ‘Kairos’ that allows for background sessions. Notably, it also revealed the existence of a new model internally named ‘Capybara’.
In the developer community, the leak has caused significant excitement, with some comparing it to an accidental open-source event. One observer noted, “The leak of the Claude Code source code has made the whole network restless.”
Another commented, “This level of ‘open-source’ method has simply left Silicon Valley stunned.” The implications of this leak are still unfolding, as developers rush to analyze the exposed code.
This isn’t the first time Anthropic has inadvertently leaked details about Claude Code; a similar breach occurred in February 2025. The company is now under scrutiny to prevent future incidents.
As the situation develops, further statements from Anthropic are anticipated, particularly regarding measures to enhance their code security protocols.