Skip to main content
Mallory
Mallory

Anthropic Claude Opus 4.6 Finds High-Severity Firefox Vulnerabilities in Mozilla Engagement

mozillafirefoxvulnerabilityjavascript engineopen-sourcesecure developmentuse-after-freecode scanningai code reviewpatchingstatic analysis
Updated March 10, 2026 at 02:00 PM4 sources
Anthropic Claude Opus 4.6 Finds High-Severity Firefox Vulnerabilities in Mozilla Engagement

Get Ahead of Threats Like This

Know if you're exposed — before adversaries strike.

Anthropic reported that Claude Opus 4.6 identified 22 security vulnerabilities in Mozilla Firefox during a two-week collaboration with Mozilla, with 14 categorized as high severity. The work began in Firefox’s JavaScript engine and expanded across the broader codebase, demonstrating that an AI model can rapidly surface memory-safety and other complex issues in a mature, heavily scrutinized open-source project; one example cited was a use-after-free class bug discovered early in the effort. Mozilla validated the findings and shipped fixes, with most issues addressed in Firefox 148 (and some remediations deferred to a subsequent release, per reporting).

Separate reporting discussed market and product implications of Anthropic’s Claude Code Security feature—an AI-assisted code-scanning capability that suggests patches and is positioned as an alternative to traditional rules-based static analysis—along with investor reactions affecting major security vendors. While related to AI-driven secure development, that coverage does not describe the Firefox vulnerability-discovery engagement itself and is better treated as adjacent industry context rather than part of the same specific event.

Related Stories

Anthropic Claude Code Security and AI-Assisted Bug Discovery

Anthropic Claude Code Security and AI-Assisted Bug Discovery

Anthropic’s **Claude Code Security** was introduced as an AI-driven capability within *Claude Code* that scans source code for vulnerabilities and proposes patches for human review, positioning itself as more adaptive than traditional rules-based static analysis. Coverage noted that early investor reaction briefly pressured major security vendors’ valuations, but analysts assessed the longer-term market impact as likely to be more nuanced given the feature’s early-preview status and its role as an add-on within a broader coding assistant/agent rather than a standalone security product. Separately, Mozilla engineers reported using **Claude** to help identify a “slew” of new Firefox issues, while also highlighting that a meaningful share of observed Firefox crashes may not be software defects at all but *hardware-induced memory errors* (“bit flips”). Mozilla cited roughly **470,000** weekly crash reports (from opted-in users), with about **25,000** flagged as potential bit flips (and possibly higher due to conservative heuristics), underscoring that AI-assisted bug-finding can improve software quality but may not address instability rooted in faulty or error-prone hardware (including potential causes like **Rowhammer** or defective components).

1 weeks ago
Anthropic Claude Opus 4.6 Used to Discover and Help Patch High-Severity Vulnerabilities in Open-Source Software

Anthropic Claude Opus 4.6 Used to Discover and Help Patch High-Severity Vulnerabilities in Open-Source Software

Anthropic released **Claude Opus 4.6**, highlighting improved *agentic* coding performance (code review, debugging, and sustained work over large codebases) and expanded safety evaluation coverage. The company claims the model is better at finding real vulnerabilities in codebases and behaves more consistently on complex tasks, while maintaining low rates of misaligned behavior (e.g., deception) and reducing unnecessary refusals to benign requests. Anthropic also reported using Claude Opus 4.6 to identify **500+ previously unknown high-severity flaws** in widely used open-source libraries, including **Ghostscript**, **OpenSC**, and **CGIF**, and said the issues were validated to avoid hallucinations and have been patched by maintainers. The company described testing by its **Frontier Red Team** in a virtualized environment with access to tools like debuggers and fuzzers, aiming to measure the model’s out-of-the-box vulnerability discovery capability without specialized prompting or custom scaffolding, and using the model to help prioritize severe memory-corruption findings.

1 months ago
Anthropic Expands Claude’s Agentic Coding Capabilities and Adds Embedded Vulnerability Scanning

Anthropic Expands Claude’s Agentic Coding Capabilities and Adds Embedded Vulnerability Scanning

Anthropic announced **Claude Code Security**, an embedded capability in *Claude Code* that scans customer codebases for vulnerabilities and suggests patches, initially rolling out to a limited set of enterprise/team customers for testing. The company said the feature was stress-tested via internal red-teaming, Capture-the-Flag exercises, and collaboration with **Pacific Northwest National Laboratory**, and positioned it as a way to reduce reliance on manual security reviews as AI-assisted “vibe coding” increases and attackers also use AI to accelerate weakness discovery. In parallel, Anthropic released **Claude Sonnet 4.6**, emphasizing improved coding performance, stronger “computer use” capabilities, and expanded developer tooling (e.g., adaptive/extended thinking modes, beta context compaction, and API tools for web search/fetch and code execution). Separate commentary highlighted the security risk of **agentic coding assistants** (e.g., *Claude Code*, *Cursor*, *GitHub Copilot*) operating with broad privileges—file access, shell execution, and secret handling—and argued that the emerging **Model Context Protocol (MCP)** ecosystem needs stronger, future-proof identity controls; additional industry guidance promoted **MLSecOps** as a way to integrate security into AI/ML development lifecycles, though it did not report a specific incident or vulnerability.

3 weeks ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed — before adversaries strike.