
Anthropic accidentally released a software package for Claude Code AI that included a large amount of internal, sensitive data. The leak quickly caught the attention of developers worldwide, but the response was particularly intense in China, where the AI tool is officially unavailable. Chinese engineers who access Anthropic's services through virtual private networks scrambled to download mirrored copies and began analyzing the exposed code in detail.
On social media platforms in China, discussions about the so-called "Claude Code source code leak incident" surged. Developers shared detailed breakdowns of the software's architecture, memory systems, and agent framework.
Even though access to U.S. AI models is restricted on national security grounds, Chinese engineers have long been interested in frontier coding assistants that promise to automate software development workflows. The leak provided them with a rare technical window into the operational logic and orchestration layer that transforms a large language model into a usable product.
Industry experts note that the leaked code did not expose Claude's underlying model weights, which remain the most valuable component of any closed-source AI system. Still, the operational design and product decisions revealed are considered highly valuable.
Beijing-based systems architect Zhang Ruiwang called the code batches a "treasure" because they show key engineering choices behind the product. For Chinese developers and rival AI labs, this information can accelerate internal product development and provide insights that are otherwise difficult to obtain.
Anthropic responded by removing the release and sending takedown notices to code-hosting platforms like GitHub. However, mirrored copies had already spread across multiple repositories, making containment difficult.
Reports indicate that thousands of repositories were affected, increasing scrutiny over Anthropic's internal controls. The incident comes at a sensitive time for the private company, which has built its reputation on Al's security and operational discipline, and marks a second recent exposure of sensitive information.