Claude Project knowledge file contains hardcoded API tokens
Summary
Project uploader accidentally includes a knowledge file (often a README or internal doc) that has API tokens embedded. Any team member running the project can view the file, and the tokens enter model context on every turn.
Severity & confidence
Low
Hygiene-grade issue with limited direct impact. Fix opportunistically; monitor in case context changes (new exploit, new dependency, etc.).
Confirmed
Observed directly by Jiffy scanners or validated by multiple independent sources. Indicators are reliable enough to drive automated action.
Indicators
Observed patterns and artifacts associated with this entry. Each indicator can be copied into your detection stack or SIEM.
(?i)(?:api[_-]?(?:key|token)|bearer\s)[\s\S]{0,20}[A-Za-z0-9]{32,}
Detection rule
A YARA-style pseudo-rule auto-generated from the indicators above. Useful as a starting point — adapt the syntax for your target detection platform.
rule jiffy_ti_2026_000094
{
meta:
source = "jiffy-intel"
severity = "low"
description = "Auto-generated from Jiffy Intel indicators"
strings:
$content_pattern_0 = "(?i)(?:api[_-]?(?:key|token)|bearer\\s)[\\s\\S]{0,20}[A-Za-z0-9]{32,}"
condition:
$content_pattern_0
}Auto-generated from the indicators above. Adapt syntax for your detection stack before deploying.
Affected tools
| Tool | Versions | Status |
|---|---|---|
| claude.ai (Projects) | * | vulnerable |
Example artifacts
Sanitized examples of artifacts Jiffy has observed exhibiting this pattern. Publisher handles are redacted; version ranges and status reflect the most recent scan.
- Internal Tooling ProjectClaude projectRemoved
- API Playground ProjectClaude projectQuarantined
How to remediate
- 01Run a secret scan on every file before uploading to a Claude Project.
- 02Rotate any credentials that were uploaded.
Timeline & sources
Timeline
- First observedMar 15, 20261 month ago
- Last updatedApr 27, 2026today
- PublishedMar 25, 202623 days ago
Sources
References
OWASP LLM-02: Sensitive Information Disclosure (2026)
https://genai.owasp.org/llmrisk/llm-02-2026/MITRE ATT&CK T1555 — Credentials from Password Stores
https://attack.mitre.org/techniques/T1555/Jiffy Research — The AI Artifact Supply Chain
https://blog.jiffylabs.ai/posts/the-ai-artifact-supply-chainScan for patterns like this
Point Jiffy at your GitHub org, IDE config, or a single artifact. Get a scored report in under a minute.
Start a free scan