Claude Code escapes its own denylist and sandbox

(ona.com)

25 points | by tomvault 6 hours ago ago

9 comments

  • cedws 3 hours ago ago

    Claude Code’s sandboxing is a complete joke. There should be no ‘off switch.’ Sandboxing should not be opt in. It should not have full read access over the file system by default.

    I really want more security people to get involved in the LLM space because everyone seems to have just lost their minds.

    If you look at this thing through a security lens it’s horrifying, which was a cause of frustration when Anthropic changed their TOS to ban use of alternative clients with a subscription. I don’t want to use that Swiss cheese.

  • leodido 5 hours ago ago

    Author here. I helped creating Falco (CNCF runtime security) and built this (Veto) to fix the path-based identity problem we all shipped a decade ago. The dynamic linker bypass in the "where it breaks" section is the part I'm most interested in discussing. It's a class of evasion that no current eval framework measures. Happy to answer questions about the BPF LSM implementation.

    • kilobaud 2 hours ago ago

      Thanks for your work! Just curious, would it be possible to pad the denylisted binary with arbitrary bytes and circumvent the content hash?

      • walterbell 14 minutes ago ago

        Security policy usually defaults unknown artifacts to low privileges.

  • rogerrogerr an hour ago ago

    > No jailbreak, no special prompting. The agent just wanted to finish the task.

    Good lord, why do people use LLMs to write on this topic? It destroys credibility.

  • hilti 3 hours ago ago

    Thank you for this write up. I am still lightyears behind this deep knowledge, but feel like I learned from your post the vocabulary to get started.

  • tomvault 6 hours ago ago

    The adversary can reason now, and our security tools weren't built for that.

    Leo di Donato, who helped create Falco, the cloud native runtime security, wrote a technical deep dive into how Claude Code bypassed it's own denylist and sandbox. And introduces Veto, a kernel-level enforcement engine built into the Ona platform.