AI Code Provenance and Supply Chain Auditing

P6/10March 31, 2026
WhatA platform that scans npm packages, PyPI modules, and other registries for accidentally leaked source maps, prompts, API keys, and internal business logic — alerting maintainers before attackers find them.
SignalThe Claude Code leak happened because a source map was shipped in the npm registry — a basic release hygiene failure that exposed trade secrets, internal prompts, and operational metrics. This is not unique to Anthropic; it happens constantly across the ecosystem.
Why NowAI companies are shipping CLI tools and SDKs at breakneck speed, often bypassing traditional release engineering discipline, making accidental leaks of prompts and proprietary logic far more common.
MarketAI companies, SaaS vendors, and any org publishing packages to public registries. Adjacent to software supply chain security ($2B+ market). Competitors like Socket.dev focus on malicious packages, not accidental self-exposure.
MoatContinuous scanning index of every published package version creates a proprietary dataset of leak patterns; network effects as more orgs adopt and contribute detection rules.
The Claude Code Source Leak: fake tools, frustration regexes, undercover mode View discussion ↗ · Article ↗ · 1,255 pts · March 31, 2026

More ideas from March 31, 2026

Automated Supply Chain Attack Detection for Package RegistriesP7/10A real-time monitoring service that detects compromised packages on npm, PyPI, crates.io, and other registries by analyzing behavioral anomalies like credential-bypassed publishes, injected phantom dependencies, and suspicious postinstall scripts.
Zero-Trust Dependency Firewall for Development EnvironmentsC7/10A local proxy that intercepts all package installs, enforces configurable quarantine periods, blocks postinstall scripts by default, and provides a unified policy layer across npm, pip, cargo, and Go modules.
Dependency Security Copilot for AI Coding AgentsC8/10A plugin for LLM coding agents (Cursor, Claude Code, Copilot Workspace) that intercepts dependency operations, validates packages against threat intelligence, and prevents agents from blindly installing or upgrading to compromised versions.
Managed Dependency Mirror with Built-In QuarantineC7/10A hosted private registry proxy that mirrors npm, PyPI, and crates.io with an automatic 72-hour quarantine on all new publishes, behavioral analysis scanning, and instant rollback — so teams never pull a package version less than 3 days old.
AI Authorship Detection for Code ContributionsC6/10A tool that integrates with GitHub/GitLab to probabilistically flag whether a pull request or commit was written by an AI agent, giving maintainers transparency without relying on self-disclosure.
Prompt and System Instruction Leak Prevention PlatformC5/10An automated pre-release scanner and runtime guard that detects when system prompts, internal codenames, operational metrics, or business context embedded in AI agent code would be exposed to end users or public registries.