Code analysis revealing security vulnerabilities

Claude Opus 4.6 Finds 500+ Zero-Day Vulnerabilities in Open-Source Code

Anthropic's latest AI model discovered more than 500 previously unknown high-severity security flaws in open-source libraries. Some had been hiding for decades.

LORIS.PRO Feb 10, 2026 4 min read

Claude Opus 4.6, Anthropic's latest AI model, discovered 500+ high-severity zero-day vulnerabilities in open-source code. The flaws were found in libraries like Ghostscript, OpenSC, and CGIF—some undetected for decades despite millions of hours of traditional fuzzing. All findings were validated by human researchers.

The Discovery

On February 5, 2026, Anthropic's Frontier Red Team revealed that Claude Opus 4.6 had identified more than 500 previously unknown high-severity vulnerabilities in open-source software—without any specialized instructions or custom tooling.

The model was placed in a simulated computer environment with standard utilities and vulnerability analysis tools. It then determined its own methods for accomplishing the task, reading and reasoning about code the way a human security researcher would.

500+ Zero-Day Flaws Found
100% Validated by Humans
Decades Some Bugs Undetected

Notable Vulnerabilities

Three examples highlight the sophistication of Claude's analysis:

Source
"Results show that language models can add real value on top of existing discovery tools. These capabilities are inherently dual use."
Anthropic Frontier Red Team

How Claude Reasons About Code

Unlike traditional fuzzers that generate random inputs, Claude reads and reasons about code like a human researcher. It examines past fixes to find similar bugs that weren't addressed, spots patterns that tend to cause problems, and understands logic well enough to know exactly what input would break it.

For Ghostscript, Claude noted: "If this commit adds bounds checking, then the code before this commit was vulnerable." It then searched for other code paths where the same fix was missing.

The Dual-Use Risk

The same AI capabilities that help defenders find bugs could be weaponized by attackers. Anthropic acknowledges this creates a cybersecurity arms race where speed matters most.

To mitigate risks, Anthropic deployed new detection systems: "cyber-specific probes" that monitor Claude's internal activity and can block detected malicious traffic in real-time. The company acknowledged this will create friction for legitimate security research.

Industry Implications

Anthropic notes that existing disclosure norms will need to evolve. Industry-standard 90-day windows may not hold up against the speed and volume of LLM-discovered bugs. The industry will need workflows that can keep pace with AI-powered discovery.

FAQ

How many vulnerabilities did Claude Opus 4.6 find?
Claude Opus 4.6 found more than 500 previously unknown high-severity security vulnerabilities in open-source software libraries, all validated by human security researchers.
Which software libraries had vulnerabilities?
Notable affected libraries include Ghostscript (PDF/PostScript processor), OpenSC (smart card utility), and CGIF (GIF processing library). Some vulnerabilities had remained undetected for decades.
Is AI-powered vulnerability discovery a security risk?
Yes, these capabilities are inherently dual-use. The same AI that helps defenders find bugs could help attackers exploit them. Anthropic introduced new detection systems and probes to monitor for potential misuse.