Security

Claude Code Security Review

Manual security audit by senior engineers. We trace every auth path, every secret, and every integration in your Claude Code app and tell you what's broken.

Security issues we find in Claude Code apps

Patterns documented in primary-source research. Most of these ship to production by default.

Unauthorized git commits and pushes

GitHub issues #36150, #20401, #34774, #40695, and #13009 all document Claude Code committing and pushing despite explicit CLAUDE.md rules forbidding it. requireApproval config is bypassed.

Unannounced git commit --amend and force-push instructions

Issue #16113 documents Claude Code amending prior commits or force-pushing without warning, destroying work.

Production data loss

Issue #45893: Claude Code caused a production server outage and data loss. It deleted 4 critical files from the repo without approval.

Memory leaks from naïve concurrency

Documented case: 18,000 lock objects and 420MB leaked over 24h because the AI added threading.Lock() patterns inside Flask request handlers without releasing on exception, exhausting DB connections.

Convention adherence regression

After the February 2026 thinking-budget reduction, Claude Code silently violates variable name conventions, cleanup patterns, and explicit CLAUDE.md rules mid-session.

Over-eager test deletion

Removes failing tests instead of fixing the underlying code, especially under time pressure.

12 new bugs from one fix

Widely documented pattern (Medium: 'I Asked Claude to Fix a Bug. It Created 12 New Ones'): fixes that ripple beyond scope.

What a Claude Code Security Review covers

Authentication and authorization audit (specific to Claude Code's patterns)
Secret exposure scan (env vars, client bundles, git history)
Database and data-access review (RLS, privacy rules, ACLs)
External integration security (Stripe, OAuth, file uploads)
Input validation and output encoding review
Severity-ranked written report with file:line citations
Async Q&A after delivery

Frequently asked questions

Can Claude Code delete my code without permission?
GitHub issue #45893 documents exactly that: Claude Code deleted 4 critical files in a production repo without approval, causing an outage. Several open issues track unauthorized commits, force-pushes, and amend operations. Settings hardening and a manual code review reduce the risk.
Why is my Claude Code bill so high?
Opus on a 1M context window, with hooks, PreToolUse interceptors, and subagent invocation, can run hundreds of dollars per session. Most teams over-budget on context and under-budget on smaller-model fallbacks. We tune your setup in a 2x1hr Claude Code session ($150).
Do you offer Claude Code training?
Yes. Two 1-hour live sessions to get you set up properly: skills, hooks, settings, MCP servers, and cost controls. $150 total.

Find what's broken before users do.

Manual security review of your Claude Code app. From $300.

Request a Security Review