Skip to content
news8 min read

75,700 GitHub Stars in 24 Hours: How claw-code Became the Fastest-Growing Repo Ever

After the leak, Sigrid Jin ported Claude Code to Python as claw-code. 75,700 stars in 24 hours — a GitHub record. 41,500 forks. DMCA takedowns failed.

Author
Anthony M.
8 min readVerified April 2, 2026Tested hands-on
claw-code — 75,700 GitHub Stars in 24 Hours
claw-code — How a leaked AI codebase became the fastest-growing GitHub repo ever

It took Sigrid Jin less than a day to rewrite Claude Code in Python. After the March 31, 2026 source map leak exposed 512,000 lines of TypeScript, Jin published claw-code — a Python/Rust port of the architecture. It hit 75,700 GitHub stars in 24 hours (a platform record) and 41,500 forks. Anthropic's DMCA takedowns failed as mirrors proliferated across GitHub, GitLab, Codeberg, and IPFS. The original leak post by intern Chaofan Shou generated 16 million views on X.

The Leak That Started It All

On March 31, 2026, security researcher Chaofan Shou discovered that the npm package @anthropic-ai/claude-code v2.1.88 included a source map file (cli.js.map) weighing 59.8 MB. This single file reconstructed the entire TypeScript source code of Claude Code — approximately 1,900 files and 512,000 lines of non-obfuscated code.

Within hours, the discovery was public. Within a day, someone had already done something nobody at Anthropic expected: port the entire thing to a different language and release it as open source.

TimelineEvent
March 31, morningChaofan Shou discovers source map in npm package
March 31, afternoonDiscovery posted publicly, source code begins circulating
March 31, eveningSigrid Jin begins Python/Rust port
April 1, 00:00claw-code repository goes live on GitHub
April 1, 24:0075,700 stars reached — GitHub record broken
April 1-2Anthropic files DMCA takedown
April 2+Mirrors proliferate, DMCA becomes ineffective

Sigrid Jin: The Developer Behind claw-code

Sigrid Jin, known on GitHub as @instructkr, is a Korean developer and AI researcher. When the Claude Code source map leaked, Jin did not just download the code. They analyzed the entire 512,000-line TypeScript codebase, mapped its architecture, and then rewrote it as a functional Python/Rust implementation.

The claw-code repository is not a direct copy of the TypeScript source. It is a clean-room port that preserves the metadata and structure — file names, command snapshots, tool definitions — while reimplementing the logic in Python with a Rust runtime. This distinction matters legally: it is a derivative work based on leaked information, not a verbatim copy of copyrighted code.

claw-code GitHub Stars — 75,700 in 24 Hours Growth Chart
claw-code star count trajectory — from 0 to 75,700 in a single day

The repository includes:

  • A functional Rust CLI with API client and runtime
  • Reference data preserving original file names from the TypeScript source
  • Command and tool snapshots documenting the original architecture
  • Detailed analysis documents covering feature flags, model codenames, and system architecture

75,700 Stars in 24 Hours: Breaking GitHub Records

The numbers behind claw-code are unprecedented in GitHub history:

MetricValueContext
Stars in 24 hours75,700Previous record: ~30,000 (DeepSeek R1)
Forks41,500Each fork is a complete copy of the codebase
Views on X (Twitter)16 million+Across all related posts and threads
Time to #1 trending<6 hoursFastest ascent to GitHub trending #1
Mirror repositoriesHundredsAcross GitHub, GitLab, Codeberg, Bitbucket, IPFS

To put 75,700 stars in 24 hours in perspective: most successful open-source projects take months or years to reach that number. React has 234,000 stars accumulated over 11 years. TensorFlow has 189,000 over 9 years. claw-code hit 75,700 in a single rotation of the Earth.

The fork count of 41,500 is equally significant. Each fork creates an independent copy of the repository under a different GitHub account. Even if the original repository is deleted, 41,500 copies persist. This is what made the DMCA takedown effectively impossible.

Anthropic's Failed DMCA Takedown

Anthropic responded within approximately 24-48 hours by filing a DMCA takedown request with GitHub. The original claw-code repository was temporarily restricted. But the damage — from Anthropic's perspective — was already done.

The problem with DMCA takedowns in the age of distributed version control:

  • 41,500 forks: GitHub's DMCA process can target the original repo, but each fork requires a separate takedown notice
  • Cross-platform mirrors: within hours of the DMCA filing, mirrors appeared on GitLab, Codeberg, Bitbucket, self-hosted Gitea instances, and IPFS (which cannot be taken down at all)
  • Archive sites: The code was captured by multiple web archiving services
  • Local clones: Tens of thousands of developers had already cloned the repository to their local machines

This is the textbook definition of the Streisand Effect: the attempt to suppress information draws more attention to it than the original disclosure would have. Anthropic's DMCA filing became a news story itself, driving even more traffic to the mirrors.

The Community Response: ccleaks.com and buddylab.cc

The leak did not just produce a GitHub repository. It spawned an entire community ecosystem:

ccleaks.com

A community site dedicated to analyzing and documenting everything discovered in the Claude Code source leak. The site catalogs feature flags, environment variables, hidden commands, model codenames, and architecture details. It serves as a centralized reference for researchers and developers studying the leaked codebase.

buddylab.cc

Named after the BUDDY feature flag discovered in the leak (the Tamagotchi companion system with 18 species and 5 stats), buddylab.cc became a community hub for experimenting with the leaked code. The name is a direct reference to one of the most unexpected discoveries: Anthropic built a complete virtual pet system inside their AI coding tool.

Social Media Explosion

The leak generated massive engagement across social platforms:

  • X (Twitter): 16 million+ views across related posts. Every major AI influencer, developer advocate, and tech journalist covered it.
  • Reddit: Multiple front-page posts on r/programming, r/MachineLearning, r/artificial, and r/technology
  • Hacker News: Multiple #1 posts with thousands of comments
  • YouTube: Dozens of analysis videos within the first week
  • Discord/Telegram: Dedicated channels in major AI communities for real-time analysis
claw-code Community Ecosystem — ccleaks.com, buddylab.cc, mirrors
The claw-code community ecosystem: GitHub mirrors, analysis sites, and social media reach

The Streisand Effect in Action

The claw-code saga is a case study in the Streisand Effect — the phenomenon where trying to suppress information makes it spread faster.

Consider the sequence of events:

  1. Source map ships in npm: Anthropic accidentally includes cli.js.map in the published package. At this point, anyone running npm install @anthropic-ai/claude-code downloads the entire source code.
  2. Researcher discovers it: Chaofan Shou finds the file and publishes the discovery. This is a security disclosure — standard practice in the tech industry.
  3. Community ports it: Sigrid Jin creates claw-code, making the code accessible in Python/Rust. Stars accumulate at 3,000+ per hour.
  4. Anthropic files DMCA: The takedown attempt generates headlines. "Anthropic tries to suppress leaked code" becomes a bigger story than "Anthropic accidentally shipped source map."
  5. Mirrors explode: The DMCA drives a rush to fork, mirror, and archive. Every developer who was not paying attention is now downloading the code.

By the time Anthropic's DMCA was processed, the code existed in so many locations that suppression was mathematically impossible. The 41,500 forks on GitHub alone represent 41,500 independent copies that would each need a separate legal action.

What the Leak Revealed

The reason claw-code attracted 75,700 stars was not mere curiosity — the leaked code contained genuinely newsworthy information about Anthropic's plans:

  • 32 compile-time feature flags for unshipped features including voice mode, plugin marketplace, Chrome extension, multi-agent orchestration, and a Tamagotchi companion
  • 22+ GrowthBook runtime gates that Anthropic can toggle remotely without user updates
  • Model codenames: Capybara (Opus 5/Mythos), Fennec (early name for Opus 4.6), Tengu (Claude Code project name), Numbat (unknown), and references to Opus 4.7 and Sonnet 4.8
  • Anti-distillation defenses: fake tool injection to poison competitor training data
  • 330+ environment variables covering authentication, model configuration, cloud providers, telemetry, and remote control capabilities
  • KAIROS: a persistent always-on AI assistant with proactive capabilities, referenced 150+ times in the codebase

This was not just source code — it was a roadmap for the next generation of AI coding tools.

The claw-code situation exists in a legal gray area that has no clear precedent:

Legal QuestionComplexity
Is shipping a source map in an npm package a "publication"?Arguably yes — npm packages are publicly downloadable
Is a Python port of leaked TypeScript a derivative work?Yes, but the leak itself was Anthropic's error
Can DMCA apply to accidentally published code?Copyright still applies, but remedies are limited
Are forks of a DMCA-targeted repo also infringing?Technically yes, but enforcement at scale is impractical
Does the Rust rewrite qualify as clean-room?Debatable — the reference data preserves original metadata

The practical reality: once code is distributed to millions of developers via npm, the legal mechanisms for recalling it are insufficient. DMCA was designed for a world where content exists in one place. In a world of distributed version control and content-addressable storage (IPFS), it fails.

Impact on Anthropic

The leak had several immediate consequences for Anthropic:

  • Competitive intelligence exposed: Every competitor (OpenAI, Google, Meta, xAI) now knows exactly what Anthropic is building, how far along each feature is, and what internal codenames to watch for.
  • Security measures undermined: The anti-distillation system, Undercover Mode, and remote kill-switches are all less effective now that their existence and mechanisms are public.
  • Model codenames burned: Capybara, Fennec, Tengu, Numbat, Mythos — all codenames must be considered compromised. The Undercover Mode system that was supposed to prevent this is now public knowledge.
  • Trust and perception: Shipping a 59.8 MB source map in a production npm package raises questions about Anthropic's build and release processes.

What Happens Next

The claw-code phenomenon is not over. The community continues to analyze the leaked code, discover new details, and build tools based on the architecture. Key developments to watch:

  • Feature flag monitoring: now that the flag names are known, the community can detect when Anthropic activates them
  • Model codename tracking: Capybara/Mythos, Numbat, Opus 4.7, and Sonnet 4.8 are all on the watchlist
  • Plugin ecosystem: community developers may build compatible plugins before Anthropic officially launches the marketplace
  • Alternative implementations: claw-code proves that a functional Claude Code harness can exist outside Anthropic's control

Frequently Asked Questions

What is claw-code?

claw-code is a Python/Rust port of Anthropic's Claude Code, created by developer Sigrid Jin (@instructkr) after the March 31, 2026 source code leak. It reimplements the Claude Code harness architecture — CLI, API client, runtime, and tool system — based on the leaked TypeScript source. It is not a direct copy but a functional rewrite.

How did claw-code get 75,700 stars in 24 hours?

The combination of the most significant AI source code leak ever, a functional reimplementation, massive social media attention (16M+ views on X), coverage by every major tech news outlet, and the Streisand Effect from Anthropic's DMCA takedown drove unprecedented GitHub engagement. Stars accumulated at over 3,000 per hour at peak.

Did the DMCA takedown work?

No. By the time Anthropic filed the DMCA, the repository had 41,500 forks on GitHub alone, plus mirrors on GitLab, Codeberg, Bitbucket, IPFS, and personal Gitea instances. Each fork or mirror would require a separate takedown. The DMCA actually accelerated distribution by generating news coverage that drew more people to download the code.

The legal situation is complex and unprecedented. The source code is protected by copyright regardless of how it was published. However, it was distributed publicly via npm — a platform designed for public code distribution. The Python/Rust port adds a layer of legal ambiguity as a derivative work. There is no clear precedent for this specific scenario. Users should consult legal counsel before using leaked code in commercial projects.

What did the leaked code actually reveal?

The leak exposed 32 compile-time feature flags for unshipped features (voice mode, plugin marketplace, Tamagotchi companion, multi-agent orchestration), 22+ runtime gates controllable remotely by Anthropic, model codenames (Capybara/Mythos for Opus 5, Fennec for Opus 4.6, Tengu for the project itself), anti-distillation defenses, 330+ environment variables, and references to upcoming models including Opus 4.7 and Sonnet 4.8.

Related Articles

Was this review helpful?
Anthony M. — Founder & Lead Reviewer
Anthony M.Verified Builder

We're developers and SaaS builders who use these tools daily in production. Every review comes from hands-on experience building real products — DealPropFirm, ThePlanetIndicator, PropFirmsCodes, and many more. We don't just review tools — we build and ship with them every day.

Written and tested by developers who build with these tools daily.