Knowledge Quiz
Test your understanding of this article
1.What is the primary vulnerability described in the article regarding Claude Code?
2.What type of attack does this vulnerability make Claude Code susceptible to?
3.What is the hard-coded limit on security subcommands that causes Claude Code to bypass deny rules?
4.Who discovered and reported this issue with Claude Code?
