v2.1.81

27 Beta Flags
784 Feature Flags
217 Env Vars
786 Telemetry
19 Models
25 Endpoints
21 Headers
6 OAuth

Changes from v2.1.80

Beta Flags

+ ccr-triggers-2026-01-30

Feature Flags (tengu_*)

+ tengu_auto_dream_toggled+ tengu_brief_mode_enabled+ tengu_defer_caveat_m9k+ tengu_harbor_permissions+ tengu_mcp_channel_flags+ tengu_mcp_channel_gate+ tengu_mcp_channel_message+ tengu_message_actions_enter+ tengu_oauth_token_refresh_completed+ tengu_relink_walk_broken+ tengu_review_remote_launched+ tengu_review_remote_precondition_failed+ tengu_review_remote_teleport_failed+ tengu_slate_heron+ tengu_tern_alloy+ tengu_time_based_microcompact+ tengu_voice_silent_drop_replay

Environment Variables

+ CLAUDE_CODE_USE_POWERSHELL_TOOL

Telemetry Events

+ tengu_auto_dream_toggled+ tengu_brief_mode_enabled+ tengu_defer_caveat_m9k+ tengu_harbor_permissions+ tengu_mcp_channel_flags+ tengu_mcp_channel_gate+ tengu_mcp_channel_message+ tengu_message_actions_enter+ tengu_relink_walk_broken+ tengu_review_remote_launched+ tengu_review_remote_precondition_failed+ tengu_review_remote_teleport_failed+ tengu_slate_heron+ tengu_tern_alloy+ tengu_time_based_microcompact+ tengu_voice_silent_drop_replay

AI Analysis

API request format, headers, beta flags, auth changes

Claude Code v2.1.81 — API Request Format Analysis

Beta Header Construction

Betas are assembled via NuT() in 4411.js and sent as anthropic_beta in the request body (SDK converts to anthropic-beta header):

// NuT() merges CLAUDE_CODE_EXTRA_BODY betas with passed betas, deduplicating
if (q.anthropic_beta && Array.isArray(q.anthropic_beta)) {
  q.anthropic_beta = [...K, ...R.filter($ => !K.includes($))];
} else q.anthropic_beta = _;

Change from 2.1.80: ccr-triggers-2026-01-30 added — 27 total beta flags. Per-model betas still resolved via oN(model). The CLAUDE_CODE_DISABLE_EXPERIMENTAL_BETAS env var suppresses non-essential betas.

Auth Headers

Two paths — both redacted in logs by FU() in 1311.js (x-api-key and authorization***):

Change: tengu_oauth_token_refresh_completed telemetry event added — OAuth refresh flow now emits a completion event. The tengu_harbor_permissions flag suggests new permission gating around auth scope.

Metadata / Attribution

k__() in 4411.js constructs metadata.user_id as a hash of device_id + account_uuid + session_id:

user_id: I_({ ..._, device_id: vV(), account_uuid: dR()?.accountUuid ?? "", session_id: vT() })

CLAUDE_CODE_EXTRA_METADATA env var allows additional fields to be merged in. No changes here from 2.1.80.

Prompt Cache Headers

nB() constructs cache_control objects. Xq$() gates the ttl: "1h" option:

No changes from 2.1.80.

Streaming Helper Header

From 1340.js, streaming requests append:

X-Stainless-Helper-Method: stream

No changes.

New MCP Channel Headers

tengu_mcp_channel_flags, tengu_mcp_channel_gate, tengu_mcp_channel_message are new feature flags — these gate MCP connection behavior but don't appear to modify HTTP headers directly. The hEq() function in 3094.js parses Header-Name: value strings for custom MCP server headers (unchanged).


Summary of changes affecting wire format:

Area Change
anthropic-beta ccr-triggers-2026-01-30 added
OAuth Token refresh now tracked via telemetry (tengu_oauth_token_refresh_completed)
Other headers No changes detected

New telemetry events, tracking, data collection

v2.1.81 Telemetry Inventory

New Events (16 total)

Event Likely Purpose Privacy Risk
tengu_mcp_channel_message Messages through MCP channels HIGH — may capture message metadata/content
tengu_harbor_permissions Permission decisions for "harbor" feature MEDIUM — tool names, possibly file paths (see blocked_path in can_use_tool handler in 4662.js)
tengu_review_remote_launched Remote code review session start MEDIUM — repo/code context sent remotely
tengu_review_remote_precondition_failed Remote review precondition check failures Low-medium — captures what check failed
tengu_review_remote_teleport_failed Session/context transfer failure for remote review Low-medium
tengu_relink_walk_broken Filesystem relink traversal failure Low-medium — error context may include file paths
tengu_voice_silent_drop_replay Voice input drop/replay events Low-medium — voice session metadata
tengu_mcp_channel_flags MCP channel config flags at runtime Low
tengu_mcp_channel_gate MCP channel access gate decisions Low
tengu_auto_dream_toggled Auto-dream mode toggle Low — UI state
tengu_brief_mode_enabled Brief/compact response mode activation Low — UI state
tengu_message_actions_enter User enters message actions UI Low — UI interaction
tengu_time_based_microcompact Time-triggered conversation compaction Low — timing data
tengu_defer_caveat_m9k Opaque — caveat/warning deferral Unknown
tengu_slate_heron Opaque codename Unknown
tengu_tern_alloy Opaque codename Unknown

Note: tengu_oauth_token_refresh_completed is in Feature Flags but not in Telemetry Events — it's a gate, not a fired event.


Data Collection Context (from modules)

k__() in 4411.js — sent with every API request:

{ user_id: JSON({ device_id, account_uuid, session_id }) }

Existing behavior, but note account_uuid + device_id + session_id are all bundled as a single user_id field.

tengu_headless_latency (existing, 3036.js) — fields: turn_number, time_to_first_response_ms, time_to_query_start_ms, query_overhead_ms, checkpoint_count, entrypoint.


Privacy Flags

  1. tengu_mcp_channel_message — MCP tool calls carry file contents, shell output, etc. Even metadata (channel ID, message type, size) is sensitive in enterprise contexts.

  2. tengu_harbor_permissions — The can_use_tool handler (4662.js) already captures tool_name, blocked_path, decision_reason. If tengu_harbor_permissions echoes similar fields, file paths are in the payload.

  3. Remote review triad (tengu_review_remote_*) — A new remote review capability is being instrumented. Three events covering launch, precondition failure, and "teleport" failure. The feature itself (sending code to a remote endpoint) is the privacy concern, not just the telemetry.

  4. Three opaque events (tengu_defer_caveat_m9k, tengu_slate_heron, tengu_tern_alloy) — cannot determine payloads from the provided modules. Worth monitoring in future diffs.

  5. CLAUDE_CODE_USE_POWERSHELL_TOOL — new env var enabling PowerShell as a tool. Any PowerShell commands executed would flow through existing PreToolUse/PostToolUse hooks and bash-command telemetry.


New features, feature flags, capabilities

Claude Code v2.1.81 — New Capabilities Summary

Feature Flags (tengu_*)

Flag Inferred Purpose
tengu_auto_dream_toggled Auto-enables "dream mode" (extended thinking/planning) based on some condition
tengu_brief_mode_enabled Compact/terse response mode — shorter outputs by default
tengu_defer_caveat_m9k Defers or suppresses certain model caveats (likely for m9k/Sonnet 4 variant)
tengu_harbor_permissions New permission system ("Harbor") — likely the upcoming redesigned trust/permissions flow
tengu_mcp_channel_flags / tengu_mcp_channel_gate / tengu_mcp_channel_message MCP channel feature: gated flag, entry gate, and messaging — likely MCP server communication channels or a new MCP transport layer
tengu_message_actions_enter Enter key triggers message actions (UI interaction change)
tengu_oauth_token_refresh_completed Tracks OAuth token refresh lifecycle — telemetry for auth reliability
tengu_relink_walk_broken Detects broken symlinks during worktree/project relinking
tengu_review_remote_launched / tengu_review_remote_precondition_failed / tengu_review_remote_teleport_failed Remote code review feature ("teleport") — launches review sessions remotely; tracks failures
tengu_slate_heron Codename for a new UI theme or model variant ("slate" + "heron" = design experiment)
tengu_tern_alloy Another codename — likely a model or runtime variant pairing
tengu_time_based_microcompact Time-triggered auto-compaction of conversation context
tengu_voice_silent_drop_replay Voice mode: silently drops and replays audio segments (latency/quality fix)

Beta Flags

Environment Variables

Key Observations

  1. Remote Review is the biggest new surface: three telemetry events (launched, precondition_failed, teleport_failed) suggest a feature where Claude Code can review code on a remote machine/session, with "teleport" as the transport mechanism.

  2. MCP Channels (mcp_channel_flags/gate/message) points to a new structured communication layer between MCP servers and Claude Code — possibly bidirectional channels rather than just tool calls.

  3. Harbor Permissions appears to be a rearchitected permissions system (replacing or extending the existing trust dialog seen in 4716.js).

  4. Brief Mode + Time-based Microcompact together suggest work on keeping context windows lean automatically.

  5. PowerShell tool (CLAUDE_CODE_USE_POWERSHELL_TOOL) signals first-class Windows support beyond WSL — a separate tool definition for PowerShell alongside Bash.


Security-relevant changes, auth, permissions, sandboxing

Security Assessment: Claude Code v2.1.81

New Attack Surface

CLAUDE_CODE_USE_POWERSHELL_TOOL (new env var) New execution backend. PowerShell has different quoting rules and injection vectors than bash. No code shown, but enabling this likely opens a new command execution path — needs review for injection hygiene parity with the bash tool.

tengu_harbor_permissions (new flag) Name suggests a permissions model change. No implementation shown, but permission model changes are high-value from an attacker's perspective. Monitor what this gates.

tengu_oauth_token_refresh_completed (new flag + telemetry) New OAuth token refresh flow. Suggests token lifecycle changes. Auth token handling changes warrant scrutiny — specifically whether refresh tokens are logged or exposed in telemetry.


Permission Model

4662.js — createCanUseTool The permission decision flow is: local policy check → race between hook decision and SDK permission request. Hook wins if it returns first. This is existing behavior, but the race is worth noting: a malicious hook that responds faster than the SDK request could silently allow or deny operations. No change here, but tengu_harbor_permissions may alter this flow.

4662.js — update_environment_variables message type

if (T.type === "update_environment_variables") {
  for (let [q, K] of Object.entries(T.variables)) process.env[q] = K;
  return;
}

This allows the input stream to mutate process.env directly. An attacker who can inject into the stdin stream can set arbitrary env vars — including PATH, NODE_PATH, or any API key variables. This is existing behavior but high-severity if stdin is not fully trusted.

3282.js — JG_ env var allowlist The PG_ allowlist filters which env vars get passed as "shell settings" vs "user env vars." Notably CLAUDE_CODE_USE_POWERSHELL_TOOL is not in the allowlist — meaning it must be set externally rather than via project config. This is correct behavior, but verify it's enforced consistently.


Sandbox/Isolation

4534.js — SandboxViolationStore

if (!z8.isSandboxingEnabled()) return;
let j = z8.getSandboxViolationStore();

UI-only component showing sandbox block count. The sandbox status check is at the UI layer only — sandboxing must be enforced deeper. No regression visible here.


Trust Dialog (4716.js)

The trust dialog ($5$) gates home directory detection:

let r = gq8.homedir() === MT();

If the user's CWD is the home directory, XV_(true) sets a different trust state vs. YH(H5$). The distinction matters — accepting trust in $HOME is a much broader grant than a project dir. This logic exists in prior versions; no change visible.

Skill/plugin Bash access check (j5$, w5$):

_.allowedTools?.some(z5$)
// z5$: _ === b6 || _.startsWith(b6 + "(")

Checks whether loaded skills/plugins request Bash tool access. Flagged in the trust dialog. This is defensive behavior, not a regression.


Teleport / Remote Session (4722.js)

New flags: tengu_review_remote_launched, tengu_review_remote_precondition_failed, tengu_review_remote_teleport_failed, tengu_relink_walk_broken

The GS9 component lists and resumes remote Claude Code sessions. Auth error classification in L5$ correctly catches /login, 403, oauth, and not authenticated strings. No obvious bypass, but the remote session feature expands the attack surface — a compromised session listed here could be selected and resumed.


Input Handling (4662.js)

processLine calls process.exit(1) on parse errors:

} catch (T) {
  console.error(`Error parsing streaming input line: ${_}: ${T}`);
  process.exit(1);
}

Malformed input kills the process. This is a DoS vector if stdin can be influenced externally (e.g., in piped/SDK modes). Existing behavior, not new.


Summary Table

Item Risk Status
CLAUDE_CODE_USE_POWERSHELL_TOOL Medium — new execution backend, injection surface unknown New, no impl shown
tengu_harbor_permissions Medium — unknown permissions change New, needs tracking
update_environment_variables via stdin High — arbitrary process.env mutation Existing, not new
OAuth token refresh flag Low-Medium — depends on implementation New
Remote session teleport Low-Medium — expands session attack surface New feature area
PowerShell not in env allowlist Mitigating Correct
Sandbox UI display None No change
Trust dialog home dir check Low — existing logic No change

Bottom line: No critical new vulnerabilities visible in the shown code. The update_environment_variables stdin handler remains the most significant existing risk. Watch tengu_harbor_permissions — name implies permissions model change but no implementation was included. The PowerShell tool addition is the largest unknown new attack surface.


Signature Data

Beta Flags (27)
advanced-tool-use-2025-11-20afk-mode-2026-01-31bedrock-2023-05-31ccr-byoc-2025-07-29ccr-triggers-2026-01-30compact-2026-01-12context-1m-2025-08-07context-management-2025-06-27effort-2025-11-24environments-2025-11-01fast-mode-2026-02-01files-api-2025-04-14interleaved-thinking-2025-05-14mcp-client-2025-11-20mcp-servers-2025-12-04message-batches-2024-09-24oauth-2025-04-20prompt-caching-scope-2026-01-05redact-thinking-2026-02-12skills-2025-10-02structured-outputs-2025-11-13structured-outputs-2025-12-15token-counting-2024-11-01tool-examples-2025-10-29tool-search-tool-2025-10-19vertex-2023-10-16web-search-2025-03-05
Model IDs (19)
claude-haiku-3-5claude-haiku-4claude-haiku-4-5claude-haiku-4-5-20251001claude-opus-4claude-opus-4-0claude-opus-4-1claude-opus-4-1-20250805claude-opus-4-20250514claude-opus-4-5claude-opus-4-5-20251101claude-opus-4-6claude-sonnet-3-7claude-sonnet-4claude-sonnet-4-claude-sonnet-4-20250514claude-sonnet-4-5claude-sonnet-4-5-20250929claude-sonnet-4-6
API Endpoints (25)
/api/event_logging/batch/api/ws/speech_to_text/voice_stream/v1/complete/v1/files/v1/messages/v1/messages/batches/v1/messages/count_tokens/v1/models/v1/tokenhttps://api-staging.anthropic.comhttps://api.anthropic.comhttps://api.anthropic.com/https://api.anthropic.com/api/claude_cli_feedbackhttps://api.anthropic.com/api/claude_code/metricshttps://api.anthropic.com/api/claude_code/organizations/metrics_enabledhttps://api.anthropic.com/api/claude_code_shared_session_transcriptshttps://api.anthropic.com/api/oauth/claude_cli/create_api_keyhttps://api.anthropic.com/api/oauth/claude_cli/roleshttps://cdn.growthbook.iohttps://mcp-proxy.anthropic.comhttps://platform.claude.com/llms.txthttps://platform.claude.com/oauth/authorizehttps://platform.claude.com/oauth/code/callbackhttps://platform.claude.com/v1/oauth/tokenhttps://storage.googleapis.com/claude-code-dist-86c565f3-f756-42ad-8dfa-d59b1c096819/claude-code-releases
HTTP Headers (21)
anthropic-admin-api-keyanthropic-api-keyanthropic-betaanthropic-dangerous-direct-browser-accessanthropic-marketplaceanthropic-pluginsanthropic-ratelimit-unified-fallbackanthropic-ratelimit-unified-overage-disabled-reasonanthropic-ratelimit-unified-overage-resetanthropic-ratelimit-unified-overage-statusanthropic-ratelimit-unified-representative-claimanthropic-ratelimit-unified-resetanthropic-ratelimit-unified-statusanthropic-versionx-anthropic-additional-protectionx-anthropic-billing-headerx-appx-claude-remote-container-idx-claude-remote-session-idx-client-appx-stainless-helper
OAuth Scopes (6)
org:create_api_keyuser:file_uploaduser:inferenceuser:mcp_serversuser:profileuser:sessions:claude_code
Environment Variables (217)
ANTHROPIC_API_KEYANTHROPIC_AUTH_TOKENANTHROPIC_BASE_URLANTHROPIC_BEDROCK_BASE_URLANTHROPIC_BETASANTHROPIC_CUSTOM_HEADERSANTHROPIC_CUSTOM_MODEL_OPTIONANTHROPIC_CUSTOM_MODEL_OPTION_DESCRIPTIONANTHROPIC_CUSTOM_MODEL_OPTION_NAMEANTHROPIC_DEFAULT_HAIKU_MODELANTHROPIC_DEFAULT_OPUS_MODELANTHROPIC_DEFAULT_SONNET_MODELANTHROPIC_FOUNDRY_API_KEYANTHROPIC_FOUNDRY_BASE_URLANTHROPIC_FOUNDRY_RESOURCEANTHROPIC_MODELANTHROPIC_SMALL_FAST_MODELANTHROPIC_SMALL_FAST_MODEL_AWS_REGIONANTHROPIC_UNIX_SOCKETANTHROPIC_VERTEX_PROJECT_IDAPI_TIMEOUT_MSCLAUDE_AFTER_LAST_COMPACTCLAUDE_AGENT_SDK_CLIENT_APPCLAUDE_AGENT_SDK_DISABLE_BUILTIN_AGENTSCLAUDE_AGENT_SDK_MCP_NO_PREFIXCLAUDE_AGENT_SDK_VERSIONCLAUDE_AUTOCOMPACT_PCT_OVERRIDECLAUDE_AUTO_BACKGROUND_TASKSCLAUDE_BASH_MAINTAIN_PROJECT_WORKING_DIRCLAUDE_BRIDGE_USE_CCR_V2CLAUDE_CHROME_PERMISSION_MODECLAUDE_CODE_ACCESSIBILITYCLAUDE_CODE_ACCOUNT_TAGGED_IDCLAUDE_CODE_ACCOUNT_UUIDCLAUDE_CODE_ACTIONCLAUDE_CODE_ADDITIONAL_DIRECTORIES_CLAUDE_MDCLAUDE_CODE_ADDITIONAL_PROTECTIONCLAUDE_CODE_ALWAYS_ENABLE_EFFORTCLAUDE_CODE_API_BASE_URLCLAUDE_CODE_API_KEY_FILE_DESCRIPTORCLAUDE_CODE_API_KEY_HELPER_TTL_MSCLAUDE_CODE_ATTRIBUTION_HEADERCLAUDE_CODE_AUTO_COMPACT_WINDOWCLAUDE_CODE_AUTO_CONNECT_IDECLAUDE_CODE_BASE_REFCLAUDE_CODE_BASH_SANDBOX_SHOW_INDICATORCLAUDE_CODE_BLOCKING_LIMIT_OVERRIDECLAUDE_CODE_BRIEFCLAUDE_CODE_BRIEF_UPLOADCLAUDE_CODE_BUBBLEWRAPCLAUDE_CODE_CLIENT_CERTCLAUDE_CODE_CLIENT_KEYCLAUDE_CODE_CLIENT_KEY_PASSPHRASECLAUDE_CODE_CONTAINER_IDCLAUDE_CODE_CUSTOM_OAUTH_URLCLAUDE_CODE_DATADOG_FLUSH_INTERVAL_MSCLAUDE_CODE_DEBUG_LOGS_DIRCLAUDE_CODE_DEBUG_LOG_LEVELCLAUDE_CODE_DIAGNOSTICS_FILECLAUDE_CODE_DISABLE_1M_CONTEXTCLAUDE_CODE_DISABLE_ADAPTIVE_THINKINGCLAUDE_CODE_DISABLE_ATTACHMENTSCLAUDE_CODE_DISABLE_AUTO_MEMORYCLAUDE_CODE_DISABLE_BACKGROUND_TASKSCLAUDE_CODE_DISABLE_CLAUDE_MDSCLAUDE_CODE_DISABLE_COMMAND_INJECTION_CHECKCLAUDE_CODE_DISABLE_CRONCLAUDE_CODE_DISABLE_EXPERIMENTAL_BETASCLAUDE_CODE_DISABLE_FAST_MODECLAUDE_CODE_DISABLE_FEEDBACK_SURVEYCLAUDE_CODE_DISABLE_FILE_CHECKPOINTINGCLAUDE_CODE_DISABLE_GIT_INSTRUCTIONSCLAUDE_CODE_DISABLE_LEGACY_MODEL_REMAPCLAUDE_CODE_DISABLE_NONESSENTIAL_TRAFFICCLAUDE_CODE_DISABLE_OFFICIAL_MARKETPLACE_AUTOINSTALLCLAUDE_CODE_DISABLE_PRECOMPACT_SKIPCLAUDE_CODE_DISABLE_TERMINAL_TITLECLAUDE_CODE_DISABLE_THINKINGCLAUDE_CODE_DISABLE_VIRTUAL_SCROLLCLAUDE_CODE_DONT_INHERIT_ENVCLAUDE_CODE_EAGER_FLUSHCLAUDE_CODE_EFFORT_LEVELCLAUDE_CODE_EMIT_TOOL_USE_SUMMARIESCLAUDE_CODE_ENABLE_CFCCLAUDE_CODE_ENABLE_FINE_GRAINED_TOOL_STREAMINGCLAUDE_CODE_ENABLE_PROMPT_SUGGESTIONCLAUDE_CODE_ENABLE_SDK_FILE_CHECKPOINTINGCLAUDE_CODE_ENABLE_TASKSCLAUDE_CODE_ENABLE_TELEMETRYCLAUDE_CODE_ENABLE_TOKEN_USAGE_ATTACHMENTCLAUDE_CODE_ENHANCED_TELEMETRY_BETACLAUDE_CODE_ENTRYPOINTCLAUDE_CODE_ENVIRONMENT_KINDCLAUDE_CODE_ENVIRONMENT_RUNNER_VERSIONCLAUDE_CODE_EXIT_AFTER_FIRST_RENDERCLAUDE_CODE_EXIT_AFTER_STOP_DELAYCLAUDE_CODE_EXPERIMENTAL_AGENT_TEAMSCLAUDE_CODE_EXTRA_BODYCLAUDE_CODE_EXTRA_METADATACLAUDE_CODE_FILE_READ_MAX_OUTPUT_TOKENSCLAUDE_CODE_FORCE_FULL_LOGOCLAUDE_CODE_FORCE_GLOBAL_CACHECLAUDE_CODE_FRAME_TIMING_LOGCLAUDE_CODE_GIT_BASH_PATHCLAUDE_CODE_GLOB_HIDDENCLAUDE_CODE_GLOB_NO_IGNORECLAUDE_CODE_GLOB_TIMEOUT_SECONDSCLAUDE_CODE_HOST_PLATFORMCLAUDE_CODE_IDE_HOST_OVERRIDECLAUDE_CODE_IDE_SKIP_AUTO_INSTALLCLAUDE_CODE_IDE_SKIP_VALID_CHECKCLAUDE_CODE_INCLUDE_PARTIAL_MESSAGESCLAUDE_CODE_IS_COWORKCLAUDE_CODE_MAX_OUTPUT_TOKENSCLAUDE_CODE_MAX_RETRIESCLAUDE_CODE_MAX_TOOL_USE_CONCURRENCYCLAUDE_CODE_MCP_INSTR_DELTACLAUDE_CODE_NEW_INITCLAUDE_CODE_OAUTH_CLIENT_IDCLAUDE_CODE_OAUTH_REFRESH_TOKENCLAUDE_CODE_OAUTH_SCOPESCLAUDE_CODE_OAUTH_TOKENCLAUDE_CODE_OAUTH_TOKEN_FILE_DESCRIPTORCLAUDE_CODE_ORGANIZATION_UUIDCLAUDE_CODE_OTEL_FLUSH_TIMEOUT_MSCLAUDE_CODE_OTEL_HEADERS_HELPER_DEBOUNCE_MSCLAUDE_CODE_OTEL_SHUTDOWN_TIMEOUT_MSCLAUDE_CODE_PERFETTO_TRACECLAUDE_CODE_PLAN_MODE_INTERVIEW_PHASECLAUDE_CODE_PLAN_MODE_REQUIREDCLAUDE_CODE_PLAN_V2_AGENT_COUNTCLAUDE_CODE_PLAN_V2_EXPLORE_AGENT_COUNTCLAUDE_CODE_PLUGIN_CACHE_DIRCLAUDE_CODE_PLUGIN_GIT_TIMEOUT_MSCLAUDE_CODE_PLUGIN_SEED_DIRCLAUDE_CODE_PLUGIN_USE_ZIP_CACHECLAUDE_CODE_POST_FOR_SESSION_INGRESS_V2CLAUDE_CODE_PROFILE_STARTUPCLAUDE_CODE_PROXY_RESOLVES_HOSTSCLAUDE_CODE_QUESTION_PREVIEW_FORMATCLAUDE_CODE_REMOTECLAUDE_CODE_REMOTE_ENVIRONMENT_TYPECLAUDE_CODE_REMOTE_MEMORY_DIRCLAUDE_CODE_REMOTE_SEND_KEEPALIVESCLAUDE_CODE_REMOTE_SESSION_IDCLAUDE_CODE_RESUME_INTERRUPTED_TURNCLAUDE_CODE_SAVE_HOOK_ADDITIONAL_CONTEXTCLAUDE_CODE_SEARCH_HINTS_IN_LISTCLAUDE_CODE_SESSIONEND_HOOKS_TIMEOUT_MSCLAUDE_CODE_SESSION_ACCESS_TOKENCLAUDE_CODE_SHELLCLAUDE_CODE_SHELL_PREFIXCLAUDE_CODE_SIMPLECLAUDE_CODE_SKIP_BEDROCK_AUTHCLAUDE_CODE_SKIP_FAST_MODE_NETWORK_ERRORSCLAUDE_CODE_SKIP_FOUNDRY_AUTHCLAUDE_CODE_SKIP_PROMPT_HISTORYCLAUDE_CODE_SKIP_VERTEX_AUTHCLAUDE_CODE_SSE_PORTCLAUDE_CODE_STALL_TIMEOUT_MS_FOR_TESTINGCLAUDE_CODE_SUBAGENT_MODELCLAUDE_CODE_SUBPROCESS_ENV_SCRUBCLAUDE_CODE_SYNC_PLUGIN_INSTALLCLAUDE_CODE_SYNC_PLUGIN_INSTALL_TIMEOUT_MSCLAUDE_CODE_SYNTAX_HIGHLIGHTCLAUDE_CODE_TAGSCLAUDE_CODE_TASK_LIST_IDCLAUDE_CODE_TEST_FIXTURES_ROOTCLAUDE_CODE_TMPDIRCLAUDE_CODE_TMUX_PREFIXCLAUDE_CODE_TMUX_PREFIX_CONFLICTSCLAUDE_CODE_TMUX_SESSIONCLAUDE_CODE_USER_EMAILCLAUDE_CODE_USE_BEDROCKCLAUDE_CODE_USE_CCR_V2CLAUDE_CODE_USE_COWORK_PLUGINSCLAUDE_CODE_USE_FOUNDRYCLAUDE_CODE_USE_POWERSHELL_TOOLCLAUDE_CODE_USE_VERTEXCLAUDE_CODE_WEBSOCKET_AUTH_FILE_DESCRIPTORCLAUDE_CODE_WORKER_EPOCHCLAUDE_CODE_WORKSPACE_HOST_PATHSCLAUDE_CONFIG_DIRCLAUDE_COWORK_MEMORY_EXTRA_GUIDELINESCLAUDE_COWORK_MEMORY_PATH_OVERRIDECLAUDE_DEBUGCLAUDE_ENABLE_STREAM_WATCHDOGCLAUDE_ENV_FILECLAUDE_FORCE_DISPLAY_SURVEYCLAUDE_REPL_MODECLAUDE_TMPDIRDISABLE_AUTOUPDATERDISABLE_AUTO_COMPACTDISABLE_AUTO_MIGRATE_TO_NATIVEDISABLE_BUG_COMMANDDISABLE_CLAUDE_CODE_SM_COMPACTDISABLE_COMPACTDISABLE_COST_WARNINGSDISABLE_DOCTOR_COMMANDDISABLE_ERROR_REPORTINGDISABLE_EXTRA_USAGE_COMMANDDISABLE_FEEDBACK_COMMANDDISABLE_INSTALLATION_CHECKSDISABLE_INSTALL_GITHUB_APP_COMMANDDISABLE_INTERLEAVED_THINKINGDISABLE_LOGIN_COMMANDDISABLE_LOGOUT_COMMANDDISABLE_PROMPT_CACHINGDISABLE_PROMPT_CACHING_HAIKUDISABLE_PROMPT_CACHING_OPUSDISABLE_PROMPT_CACHING_SONNETDISABLE_TELEMETRYDISABLE_UPGRADE_COMMANDHTTPS_PROXYHTTP_PROXYNO_PROXYUSE_API_CONTEXT_MANAGEMENT