Artificial intelligence models are rapidly evolving from simple coding assistants into highly capable, autonomous vulnerability researchers. Recently, Anthropic’s Claude Opus 4.6 demonstrated this by uncovering over 500 zero-day vulnerabilities in heavily scrutinized open-source projects.
During a two-week collaborative engagement with Mozilla in February 2026, the AI model identified 22 unique security flaws within the Firefox web browser. Mozilla classified 14 of these as high-severity vulnerabilities, representing nearly 20% of all high-severity Firefox flaws remediated the previous year.
This unprecedented discovery rate highlights a massive shift in how the cybersecurity industry approaches threat hunting. All validated vulnerabilities were swiftly addressed and patched in the Firefox 148.0 release, successfully protecting hundreds of millions of daily active users.
By automating the intensive process of scanning and reproducing complex code paths, security teams can vastly accelerate the find-and-fix lifecycle before malicious actors weaponize these zero-days.
AI-Driven Vulnerability Discovery
To test the model’s capabilities on a complex codebase, researchers directed Claude Opus 4.6 to analyze the current Firefox repository. The team initially focused on the browser’s JavaScript engine due to its massive attack surface and routine processing of untrusted external code.
Within just twenty minutes of autonomous exploration, the AI successfully identified a novel Use After Free vulnerability, a memory corruption flaw that allows attackers to overwrite data with malicious payloads.
Following this initial success, Claude scanned nearly 6,000 C++ files, resulting in 112 unique bug reports submitted directly to Mozilla’s Bugzilla issue tracker.
To manage this massive influx of data, Mozilla and Anthropic researchers collaborated to refine the triage process, proving that AI-enabled bug hunting requires tight coordination between automated tools and human maintainers.
| Vulnerability Details | Component | Security Impact | Remediation Status |
|---|---|---|---|
| Use After Free (Zero-Day) | JavaScript Engine | Allows arbitrary malicious code execution via memory corruption | Patched in Firefox 148.0 |
| High-Severity Flaws (14) | Core C++ Files | Various critical impacts requiring immediate developer intervention | Patched in Firefox 148.0 |
| Moderate-Severity Flaws (8) | Browser Subsystems | Potential for limited exploitation or defense bypass | Slated for upcoming releases |
While Claude excels at discovering flaws, its current ability to weaponize them remains limited but concerning. Anthropic tasked the model with developing functional exploits for the discovered bugs to read and write local files on a target system.
After several hundred attempts costing roughly $4,000 in API credits, the model only successfully generated working exploits in two instances.
Furthermore, these crude exploits required a testing environment with the browser sandbox disabled, meaning Firefox’s defense-in-depth architecture would have successfully mitigated the attacks in the real world.
The urgency for developers to fortify their software is growing as frontier models continue to improve. Currently, defenders hold the advantage because AI is significantly better and cheaper at finding vulnerabilities than building exploits for them.
However, with the recent limited preview release of Claude Code Security, advanced vulnerability discovery and patching capabilities are directly in the hands of customers and open-source maintainers.
Industry experts warn that the gap between discovery and exploitation will close rapidly, requiring organizations to adopt Coordinated Vulnerability Disclosure (CVD) principles to stay ahead of threats.
To defend against the impending wave of AI-generated bugs, security researchers must implement new verification workflows like “task verifiers,” which are automated methods that allow an AI patching agent to iteratively check its own work.
Key submission requirements for AI-generated vulnerability reports:
- Include accompanying minimal test cases to demonstrate the exact trigger conditions.
- Provide detailed proofs-of-concept to help maintainers understand the exploitation vector.
- Submit candidate patches generated and validated by the AI to accelerate the remediation process.
- Utilize automated test suites to ensure proposed patches remove the vulnerability without causing software regressions.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.




