Anthropic Claude Opus 4.6 Used to Discover and Help Patch High-Severity Vulnerabilities in Open-Source Software
Anthropic released Claude Opus 4.6, highlighting improved agentic coding performance (code review, debugging, and sustained work over large codebases) and expanded safety evaluation coverage. The company claims the model is better at finding real vulnerabilities in codebases and behaves more consistently on complex tasks, while maintaining low rates of misaligned behavior (e.g., deception) and reducing unnecessary refusals to benign requests.
Anthropic also reported using Claude Opus 4.6 to identify 500+ previously unknown high-severity flaws in widely used open-source libraries, including Ghostscript, OpenSC, and CGIF, and said the issues were validated to avoid hallucinations and have been patched by maintainers. The company described testing by its Frontier Red Team in a virtualized environment with access to tools like debuggers and fuzzers, aiming to measure the model’s out-of-the-box vulnerability discovery capability without specialized prompting or custom scaffolding, and using the model to help prioritize severe memory-corruption findings.
Timeline
Feb 5, 2026
Anthropic says AI-scale bug discovery may strain 90-day disclosure norms
Anthropic warned that the volume and speed of LLM-assisted vulnerability discovery could overwhelm existing validation, triage, disclosure, and patching workflows, potentially making standard 90-day disclosure timelines harder to sustain.
Feb 5, 2026
Anthropic introduces cyber-specific misuse detection and intervention controls
Alongside the model release, Anthropic announced new safeguards including six cyber-specific probes to monitor model activations and updated enforcement workflows that could intervene in real time to block malicious activity.
Feb 5, 2026
Example vulnerabilities in Ghostscript, OpenSC, and CGIF are disclosed as fixed
Anthropic and subsequent reporting highlighted patched example flaws including a stack buffer underflow in Ghostscript and buffer overflows in OpenSC and CGIF, illustrating the model's code-history and pattern-based reasoning.
Feb 5, 2026
Coordinated disclosure and patching begin for affected open-source projects
Anthropic said it had started coordinated reporting and remediation with maintainers for the discovered vulnerabilities, and that some patches had already been merged into affected projects.
Feb 5, 2026
Anthropic says Claude Opus 4.6 validated 500+ high-severity open-source flaws
Anthropic reported that Claude Opus 4.6 found and validated more than 500 previously unknown high-severity vulnerabilities, primarily memory-corruption issues, with human review used to reduce hallucinations and false positives.
Feb 5, 2026
Anthropic releases Claude Opus 4.6 and details AI zero-day research
On 2026-02-05, Anthropic published its Claude Opus 4.6 release and said the model significantly improved AI-driven vulnerability discovery in open-source software using standard tools in a VM without custom harnesses.
Nov 3, 2025
Anthropic launches Glasswing and unveils Claude Mythos for cybersecurity
Anthropic announced Glasswing, a new AI cybersecurity research initiative backed by the Linux Foundation and major technology companies, and introduced Claude Mythos, a security-focused model built on Claude Opus 4.6. Anthropic said Mythos outperformed Opus 4.6 on security benchmarks and found additional previously unknown vulnerabilities across software including Firefox, OpenBSD, FFmpeg, Linux, FreeBSD, and web applications, with disclosures being coordinated privately.
See the full picture in Mallory
Mallory subscribers get deeper analysis on every story, including:
Who’s affected and how
Deep-dive technical analysis
Actionable next steps for your team
IPs, domains, hashes, and more
Ask questions and take action on every story
Filter by topic, classification, timeframe
Get matching stories delivered automatically
Sources
5 more from sources like scworld, help net security, the hacker news, socket blog and anthropic
Related Stories

Anthropic Claude Opus 4.6 Finds High-Severity Firefox Vulnerabilities in Mozilla Engagement
Anthropic reported that **Claude Opus 4.6** identified **22 security vulnerabilities in Mozilla Firefox** during a **two-week** collaboration with Mozilla, with **14** categorized as **high severity**. The work began in Firefox’s **JavaScript engine** and expanded across the broader codebase, demonstrating that an AI model can rapidly surface memory-safety and other complex issues in a mature, heavily scrutinized open-source project; one example cited was a **use-after-free** class bug discovered early in the effort. Mozilla validated the findings and shipped fixes, with most issues addressed in **Firefox 148** (and some remediations deferred to a subsequent release, per reporting). Separate reporting discussed market and product implications of Anthropic’s *Claude Code Security* feature—an AI-assisted code-scanning capability that suggests patches and is positioned as an alternative to traditional rules-based static analysis—along with investor reactions affecting major security vendors. While related to AI-driven secure development, that coverage does not describe the Firefox vulnerability-discovery engagement itself and is better treated as adjacent industry context rather than part of the same specific event.
2 days ago
Anthropic Expands Claude’s Agentic Coding Capabilities and Adds Embedded Vulnerability Scanning
Anthropic announced **Claude Code Security**, an embedded capability in *Claude Code* that scans customer codebases for vulnerabilities and suggests patches, initially rolling out to a limited set of enterprise/team customers for testing. The company said the feature was stress-tested via internal red-teaming, Capture-the-Flag exercises, and collaboration with **Pacific Northwest National Laboratory**, and positioned it as a way to reduce reliance on manual security reviews as AI-assisted “vibe coding” increases and attackers also use AI to accelerate weakness discovery. In parallel, Anthropic released **Claude Sonnet 4.6**, emphasizing improved coding performance, stronger “computer use” capabilities, and expanded developer tooling (e.g., adaptive/extended thinking modes, beta context compaction, and API tools for web search/fetch and code execution). Separate commentary highlighted the security risk of **agentic coding assistants** (e.g., *Claude Code*, *Cursor*, *GitHub Copilot*) operating with broad privileges—file access, shell execution, and secret handling—and argued that the emerging **Model Context Protocol (MCP)** ecosystem needs stronger, future-proof identity controls; additional industry guidance promoted **MLSecOps** as a way to integrate security into AI/ML development lifecycles, though it did not report a specific incident or vulnerability.
3 weeks ago
Anthropic Claude Code Security and AI-Assisted Bug Discovery
Anthropic’s **Claude Code Security** was introduced as an AI-driven capability within *Claude Code* that scans source code for vulnerabilities and proposes patches for human review, positioning itself as more adaptive than traditional rules-based static analysis. Coverage noted that early investor reaction briefly pressured major security vendors’ valuations, but analysts assessed the longer-term market impact as likely to be more nuanced given the feature’s early-preview status and its role as an add-on within a broader coding assistant/agent rather than a standalone security product. Separately, Mozilla engineers reported using **Claude** to help identify a “slew” of new Firefox issues, while also highlighting that a meaningful share of observed Firefox crashes may not be software defects at all but *hardware-induced memory errors* (“bit flips”). Mozilla cited roughly **470,000** weekly crash reports (from opted-in users), with about **25,000** flagged as potential bit flips (and possibly higher due to conservative heuristics), underscoring that AI-assisted bug-finding can improve software quality but may not address instability rooted in faulty or error-prone hardware (including potential causes like **Rowhammer** or defective components).
1 months ago