Skip to content

CplusHua/claude-features-dump

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 

Repository files navigation

Claude Code Feature Flags Dumper

Dump all GrowthBook feature flags from Claude Code's remote eval API.

Extracted by reverse engineering the Claude Code CLI binary (Mach-O arm64), including:

  • GrowthBook SDK client key
  • Remote eval endpoint (POST /api/eval/{clientKey})
  • User attributes schema (deviceId, accountUUID, organizationUUID, etc.)
  • 178 feature flags with Chinese descriptions and functional categories

Usage

# Pretty print with categories
python3 claude_features.py

# Only show A/B experiments
python3 claude_features.py --experiments

# Raw JSON output
python3 claude_features.py --json

Requirements

  • Python 3.7+ (standard library only, no pip install needed)
  • Claude Code installed and logged in (OAuth)
  • macOS or Linux

How it works

  1. Reads ~/.claude.json (or ~/.claude/.config.json) for deviceId, accountUUID, etc.
  2. Extracts OAuth token from system keychain (macOS security / Linux secret-tool)
  3. Sends POST https://api.anthropic.com/api/eval/sdk-zAZezfDKGoZuXXKe with user attributes
  4. Parses and displays feature flags grouped by category with Chinese descriptions

Screenshot

output

Disclaimer

This tool is for educational and security research purposes. The GrowthBook client key (sdk-zAZezfDKGoZuXXKe) is embedded in the publicly distributed Claude Code binary.

About

Dump Claude Code GrowthBook feature flags via reverse engineering

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages