Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries
好的,我现在需要帮用户总结这篇文章的内容,控制在100个字以内。首先,我得通读整篇文章,抓住主要信息。 文章讲的是Anthropic公司最新的人工智能模型Claude Opus 4.6发现了超过500个开源库的高危安全漏洞。这些漏洞包括Ghostscript、OpenSC和CGIF中的问题。模型提升了代码审查和调试能力,无需特定工具就能发现漏洞,并帮助修复。 接下来,我需要将这些关键点浓缩到100字以内。要确保涵盖模型名称、发现的漏洞数量、涉及的开源库以及模型的能力提升。 可能的结构是:Anthropic的Claude Opus 4.6发现了500多个高危漏洞,包括Ghostscript等开源库的问题,提升了代码审查和调试能力,无需特定工具即可发现并帮助修复漏洞。 这样既简洁又全面,符合用户的要求。 </think> Anthropic的Claude Opus 4.6发现超500个开源库高危漏洞,包括Ghostscript、OpenSC和CGIF中的缺陷,并提升了代码审查和调试能力以帮助修复问题。 2026-2-6 05:49:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Artificial Intelligence / Vulnerability

Artificial intelligence (AI) company Anthropic revealed that its latest large language model (LLM), Claude Opus 4.6, has found more than 500 previously unknown high-severity security flaws in open-source libraries, including Ghostscript, OpenSC, and CGIF.

Claude Opus 4.6, which was launched on Thursday, comes with improved coding skills, including code review and debugging capabilities, along with enhancements to tasks like financial analyses, research, and document creation.

Stating that the model is "notably better" at discovering high-severity vulnerabilities without requiring any task-specific tooling, custom scaffolding, or specialized prompting, Anthropic said it is putting it to use to find and help fix vulnerabilities in open-source software.

"Opus 4.6 reads and reasons about code the way a human researcher would—looking at past fixes to find similar bugs that weren't addressed, spotting patterns that tend to cause problems, or understanding a piece of logic well enough to know exactly what input would break it," it added.

Prior to its debut, Anthropic's Frontier Red Team put the model to test inside a virtualized environment and gave it the necessary tools, such as debuggers and fuzzers, to find flaws in open-source projects. The idea, it said, was to assess the model's out-of-the-box capabilities without providing any instructions on how to use these tools or providing information that could help it better flag the vulnerabilities.

The company also said it validated every discovered flaw to make sure that it was not made up (i.e., hallucinated), and that the LLM was used as a tool to prioritize the most severe memory corruption vulnerabilities that were identified.

Some of the security defects that were flagged by Claude Opus 4.6 are listed below. They have since been patched by the respective maintainers.

  • Parsing the Git commit history to identify a vulnerability in Ghostscript that could result in a crash by taking advantage of a missing bounds check
  • Searching for function calls like strrchr() and strcat() to identify a buffer overflow vulnerability in OpenSC
  • A heap buffer overflow vulnerability in CGIF (Fixed in version 0.5.1)

"This vulnerability is particularly interesting because triggering it requires a conceptual understanding of the LZW algorithm and how it relates to the GIF file format," Anthropic said of the CGIF bug. "Traditional fuzzers (and even coverage-guided fuzzers) struggle to trigger vulnerabilities of this nature because they require making a particular choice of branches."

"In fact, even if CGIF had 100% line- and branch-coverage, this vulnerability could still remain undetected: it requires a very specific sequence of operations."

The company has pitched AI models like Claude as a critical tool for defenders to "level the playing field." But it also emphasized that it will adjust and update its safeguards as potential threats are discovered and put in place additional guardrails to prevent misuse.

The disclosure comes weeks after Anthropic said its current Claude models can succeed at multi-stage attacks on networks with dozens of hosts using only standard, open-source tools by finding and exploiting known security flaws.

"This illustrates how barriers to the use of AI in relatively autonomous cyber workflows are rapidly coming down, and highlights the importance of security fundamentals like promptly patching known vulnerabilities," it said.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/claude-opus-46-finds-500-high-severity.html
如有侵权请联系:admin#unsafe.sh