Discover and explore top open-source AI tools and projects—updated daily.
Ahmad-progrAgentic CLI for software engineering
New!
Top 99.3% on SourcePulse
Summary
This repository archives a mirrored snapshot of Claude Code's source, exposed via an npm package vulnerability on March 31, 2026. It serves educational purposes, defensive security research, and software supply-chain analysis, offering insights into agent-based developer tools and release process failures.
How It Works
Claude Code is a command-line interface for interacting with Claude for software engineering tasks. Its architecture features a modular Tool System (~40 tools for shell commands, file operations, code search, agent spawning), a Command System (~50 slash commands for user functions like /commit and /review), a Service Layer for integrations, and a Bridge System for IDE communication. It leverages TypeScript, the Bun runtime, React with Ink for its terminal UI, and Zod for data validation. Key design principles include parallel prefetching for faster startup and lazy loading of non-essential dependencies.
Quick Start & Requirements
This repository contains a source code snapshot for research and does not provide direct installation or execution instructions for the Claude Code CLI. The original project utilizes Bun as its runtime and TypeScript for development. Specific hardware, OS, or software prerequisites for running the original Claude Code are not detailed within this snapshot's README.
Highlighted Details
Maintenance & Community
This research archive is maintained by a university student focusing on software supply-chain security and agent-based systems. It is explicitly not an official Anthropic repository. No community channels (e.g., Discord, Slack) or roadmap links are provided for this research snapshot.
Licensing & Compatibility
The README does not specify a license for the mirrored source code. It emphasizes that the original Claude Code source remains the property of Anthropic. Use of this snapshot is subject to the original code owner's intellectual property rights; commercial use or closed-source linking compatibility is not addressed and likely restricted.
Limitations & Caveats
This is a snapshot of leaked source code intended solely for educational and research purposes. It lacks setup instructions for direct use and carries potential legal and ethical considerations due to its origin. The exposure method highlights significant software supply-chain security risks.
1 week ago
Inactive
Intelligent-Internet