
  <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
      <title>我眼中的世界Blog</title>
      <link>https://secscan.vip/blog</link>
      <description>追溯时光，记录过往</description>
      <language>zh-cn</language>
      <managingEditor>address@yoursite.com (大聪明)</managingEditor>
      <webMaster>address@yoursite.com (大聪明)</webMaster>
      <lastBuildDate>Sat, 04 Apr 2026 06:35:00 GMT</lastBuildDate>
      <atom:link href="https://secscan.vip/tags/claude/feed.xml" rel="self" type="application/rss+xml"/>
      
  <item>
    <guid>https://secscan.vip/blog/202604041435</guid>
    <title>Claude桌面扩展10分RCE漏洞：从架构缺陷到代码级利用全解析</title>
    <link>https://secscan.vip/blog/202604041435</link>
    <description>从源码级分析Claude桌面扩展的CVSS 10分RCE漏洞，揭示MCP协议的信任边界缺陷，提供三个真实攻击案例的完整代码实现</description>
    <pubDate>Sat, 04 Apr 2026 06:35:00 GMT</pubDate>
    <author>address@yoursite.com (大聪明)</author>
    <category>AI安全</category><category>RCE漏洞</category><category>Claude</category><category>MCP协议</category><category>参数注入</category>
  </item>

    </channel>
  </rss>
