Git Identity Spoof Lets Claude Code Approve Bad Code


TL;DR

  • Exploit: Manifold Security showed that spoofed Git author metadata could convince a Claude-powered workflow to approve malicious code.
  • Root Cause: GitHub documentation shows unsigned author strings are not verified identity and should not drive trust decisions.
  • Why It Matters: Any GitHub Actions coding agent with broad permissions can inherit the same risk when approvals bypass human oversight.

Manifold Security this week shared how Anthropic’s Claude approved a malicious pull request after a workflow treated unsigned Git author metadata as proof that the change came from a trusted maintainer. For teams relying on AI review bots to keep pull requests moving, the demonstration turned a routine trust shortcut into a direct path for hostile code.

That warning reaches beyond one lab setup. In the same trusted developer identity report, Manifold said the workflow accepted and merged the pull request and that a GitHub search found more than 12,400 public workflow files referencing claude-code-action, suggesting the pattern is already widely copied.

Anthropic’s Claude Code GitHub Actions docs show the product is built for real repository workflows that analyze code, open pull requests, implement features, and fix bugs from GitHub events. No public Anthropic response or mitigation statement appeared in the sourced material.

How the Spoof Worked

In Manifold’s test, the workflow was configured to trust recognized industry figures, then used two git config commands to impersonate a well-known AI researcher.

According to the report, that trust rule was explicit enough to auto-approve pull requests from a “recognized industry legend.” From there, the Claude-driven review flow treated the forged author as legitimate, was instructed to run gh pr review --approve and gh pr merge, and auto-approved the malicious pull request.