Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Darkly)
  • No Skin
Collapse
Brand Logo
  1. Home
  2. Uncategorized
  3. I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages.

I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages.

Scheduled Pinned Locked Moved Uncategorized
20 Posts 9 Posters 9 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • Dan GoodinD Dan Goodin

    I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

    https://red.anthropic.com/2026/zero-days/

    H This user is from outside of this forum
    H This user is from outside of this forum
    :ruby: a HOT Rubie :ruby:
    wrote last edited by
    #2

    @dangoodin 500 is such a nice, round number. Very much like a number a human would pick at random. That alone makes it rather suspect.

    1 Reply Last reply
    0
    • Dan GoodinD Dan Goodin

      I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

      https://red.anthropic.com/2026/zero-days/

      RootWyrm πŸ‡ΊπŸ‡¦:progress:R This user is from outside of this forum
      RootWyrm πŸ‡ΊπŸ‡¦:progress:R This user is from outside of this forum
      RootWyrm πŸ‡ΊπŸ‡¦:progress:
      wrote last edited by
      #3

      @dangoodin zero question it's pure fantasy bullshit. They refuse to show their work, as usual. All they've got is a middling CGIF vulnerability that isn't, and claiming credit for "finding" a vulnerability in GhostScript because "hey this commit did a thing so they must have had a vulnerability!"

      RootWyrm πŸ‡ΊπŸ‡¦:progress:R 1 Reply Last reply
      0
      • RootWyrm πŸ‡ΊπŸ‡¦:progress:R RootWyrm πŸ‡ΊπŸ‡¦:progress:

        @dangoodin zero question it's pure fantasy bullshit. They refuse to show their work, as usual. All they've got is a middling CGIF vulnerability that isn't, and claiming credit for "finding" a vulnerability in GhostScript because "hey this commit did a thing so they must have had a vulnerability!"

        RootWyrm πŸ‡ΊπŸ‡¦:progress:R This user is from outside of this forum
        RootWyrm πŸ‡ΊπŸ‡¦:progress:R This user is from outside of this forum
        RootWyrm πŸ‡ΊπŸ‡¦:progress:
        wrote last edited by
        #4

        @dangoodin if "this commit changed a thing to fix a bug" is the metric, well fuck, I've found over 100,000 'vulnerabilities' in the past year.

        Dan GoodinD 1 Reply Last reply
        0
        • Fritz AdalisF This user is from outside of this forum
          Fritz AdalisF This user is from outside of this forum
          Fritz Adalis
          wrote last edited by
          #5

          @GossiTheDog @dangoodin
          This looks like the first one.

          https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=4e392a82d1b1780cab85804728317f36a9c4f7f7

          Fritz AdalisF 1 Reply Last reply
          0
          • Fritz AdalisF Fritz Adalis

            @GossiTheDog @dangoodin
            This looks like the first one.

            https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=4e392a82d1b1780cab85804728317f36a9c4f7f7

            Fritz AdalisF This user is from outside of this forum
            Fritz AdalisF This user is from outside of this forum
            Fritz Adalis
            wrote last edited by
            #6

            @GossiTheDog @dangoodin
            Maybe #2
            https://github.com/OpenSC/OpenSC/commit/9ab1daf21029dd18f8828d684ee6151d9238edab

            Fritz AdalisF 1 Reply Last reply
            0
            • Dan GoodinD Dan Goodin

              I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

              https://red.anthropic.com/2026/zero-days/

              SharlatanS This user is from outside of this forum
              SharlatanS This user is from outside of this forum
              Sharlatan
              wrote last edited by
              #7

              @dangoodin Daniel Steinberg mentioned on FOSDEM 2026 - full covered test suite is the wall none of "AI" could climb. I guess npm may provide even more vulnerable packages 987654321 πŸ™‚

              1 Reply Last reply
              0
              • Fritz AdalisF Fritz Adalis

                @GossiTheDog @dangoodin
                Maybe #2
                https://github.com/OpenSC/OpenSC/commit/9ab1daf21029dd18f8828d684ee6151d9238edab

                Fritz AdalisF This user is from outside of this forum
                Fritz AdalisF This user is from outside of this forum
                Fritz Adalis
                wrote last edited by
                #8

                @GossiTheDog @dangoodin
                For #3 there are a bunch of recent commits to the lzw code.

                These really seem like bugs that existing scanners should have found, especially strcat use (#2).

                1 Reply Last reply
                0
                • Dan GoodinD Dan Goodin

                  I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

                  https://red.anthropic.com/2026/zero-days/

                  Brandon RobertsB This user is from outside of this forum
                  Brandon RobertsB This user is from outside of this forum
                  Brandon Roberts
                  wrote last edited by
                  #9

                  @dangoodin Gonna go out on a limb here and posit that Claude Code is creating vulns at a much faster rate πŸ˜‚

                  1 Reply Last reply
                  0
                  • Dan GoodinD Dan Goodin

                    I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

                    https://red.anthropic.com/2026/zero-days/

                    M This user is from outside of this forum
                    M This user is from outside of this forum
                    Michael Weiss
                    wrote last edited by
                    #10

                    @dangoodin I said it elsewhere, but what's missing in my view is the false positive rate. Ok, it found 500. Did it flag 500? 5,000? 5,000,000? That's an important data point.

                    1 Reply Last reply
                    0
                    • RootWyrm πŸ‡ΊπŸ‡¦:progress:R RootWyrm πŸ‡ΊπŸ‡¦:progress:

                      @dangoodin if "this commit changed a thing to fix a bug" is the metric, well fuck, I've found over 100,000 'vulnerabilities' in the past year.

                      Dan GoodinD This user is from outside of this forum
                      Dan GoodinD This user is from outside of this forum
                      Dan Goodin
                      wrote last edited by
                      #11

                      @rootwyrm

                      That's not what Antropic said. Antropic said the vulns were high-severity.

                      RootWyrm πŸ‡ΊπŸ‡¦:progress:R 1 Reply Last reply
                      0
                      • Dan GoodinD Dan Goodin

                        @rootwyrm

                        That's not what Antropic said. Antropic said the vulns were high-severity.

                        RootWyrm πŸ‡ΊπŸ‡¦:progress:R This user is from outside of this forum
                        RootWyrm πŸ‡ΊπŸ‡¦:progress:R This user is from outside of this forum
                        RootWyrm πŸ‡ΊπŸ‡¦:progress:
                        wrote last edited by
                        #12

                        @dangoodin that is EXACTLY what Anthropic said. LITERALLY it is the FIRST "vulnerability" they bogusly claim to have found.

                        > Neither of these methods yielded any significant findings. Eventually, however, Claude took a different approach: reading the Git commit history. Claude quickly found a security-relevant commit, and commented:

                        Dan GoodinD RootWyrm πŸ‡ΊπŸ‡¦:progress:R 2 Replies Last reply
                        0
                        • Dan GoodinD Dan Goodin

                          I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

                          https://red.anthropic.com/2026/zero-days/

                          Dan GoodinD This user is from outside of this forum
                          Dan GoodinD This user is from outside of this forum
                          Dan Goodin
                          wrote last edited by
                          #13

                          Thanks for all the responses. So far, projects I understand to have received reports include: Ghostscript, OpenSC, lzw, and CGIF. Are others known? Links to commits that fix the vulns also appreciated.

                          1 Reply Last reply
                          0
                          • RootWyrm πŸ‡ΊπŸ‡¦:progress:R RootWyrm πŸ‡ΊπŸ‡¦:progress:

                            @dangoodin that is EXACTLY what Anthropic said. LITERALLY it is the FIRST "vulnerability" they bogusly claim to have found.

                            > Neither of these methods yielded any significant findings. Eventually, however, Claude took a different approach: reading the Git commit history. Claude quickly found a security-relevant commit, and commented:

                            Dan GoodinD This user is from outside of this forum
                            Dan GoodinD This user is from outside of this forum
                            Dan Goodin
                            wrote last edited by
                            #14

                            @rootwyrm

                            Right, but the post doesn't say merely that the reports of the 500 vulns resulted in commits. It says all 500 were high-severity. If true, that would be significant, no?

                            1 Reply Last reply
                            0
                            • RootWyrm πŸ‡ΊπŸ‡¦:progress:R RootWyrm πŸ‡ΊπŸ‡¦:progress:

                              @dangoodin that is EXACTLY what Anthropic said. LITERALLY it is the FIRST "vulnerability" they bogusly claim to have found.

                              > Neither of these methods yielded any significant findings. Eventually, however, Claude took a different approach: reading the Git commit history. Claude quickly found a security-relevant commit, and commented:

                              RootWyrm πŸ‡ΊπŸ‡¦:progress:R This user is from outside of this forum
                              RootWyrm πŸ‡ΊπŸ‡¦:progress:R This user is from outside of this forum
                              RootWyrm πŸ‡ΊπŸ‡¦:progress:
                              wrote last edited by
                              #15

                              @dangoodin to which I said "hang the fuck on" and read a bit more. And hey look, it's in fonts... bounds checking...

                              https://security.snyk.io/vuln/SNYK-CENTOS10-GHOSTSCRIPTTOOLSFONTS-10299121

                              Dan GoodinD 1 Reply Last reply
                              0
                              • RootWyrm πŸ‡ΊπŸ‡¦:progress:R RootWyrm πŸ‡ΊπŸ‡¦:progress:

                                @dangoodin to which I said "hang the fuck on" and read a bit more. And hey look, it's in fonts... bounds checking...

                                https://security.snyk.io/vuln/SNYK-CENTOS10-GHOSTSCRIPTTOOLSFONTS-10299121

                                Dan GoodinD This user is from outside of this forum
                                Dan GoodinD This user is from outside of this forum
                                Dan Goodin
                                wrote last edited by
                                #16

                                @rootwyrm

                                CVSS is 7.8, which is high, no? That would seem to support the Anthropic's claim. What's the significance of the vulns being in fonts . . . bounds checking?

                                RootWyrm πŸ‡ΊπŸ‡¦:progress:R 1 Reply Last reply
                                0
                                • Dan GoodinD Dan Goodin

                                  I'm curious to know what people think about Anthropic's claim that Claude found 500 high-severity vulnerabilities in open-source packages. Has anyone confirmed that these vulns were indeed high-severity and hadn't been discovered before? Is this development as big a deal as Anthropic says? Any other critiques?

                                  https://red.anthropic.com/2026/zero-days/

                                  cerementC This user is from outside of this forum
                                  cerementC This user is from outside of this forum
                                  cerement
                                  wrote last edited by
                                  #17

                                  @dangoodin

                                  (on the flip side, curl ending their bug bounty program because of the flood of slop reports)

                                  Hippo Giraffe CovfefeS 1 Reply Last reply
                                  0
                                  • cerementC cerement

                                    @dangoodin

                                    (on the flip side, curl ending their bug bounty program because of the flood of slop reports)

                                    Hippo Giraffe CovfefeS This user is from outside of this forum
                                    Hippo Giraffe CovfefeS This user is from outside of this forum
                                    Hippo Giraffe Covfefe
                                    wrote last edited by
                                    #18

                                    @cerement @dangoodin Exactly what I was going to point out.

                                    1 Reply Last reply
                                    0
                                    • Dan GoodinD Dan Goodin

                                      @rootwyrm

                                      CVSS is 7.8, which is high, no? That would seem to support the Anthropic's claim. What's the significance of the vulns being in fonts . . . bounds checking?

                                      RootWyrm πŸ‡ΊπŸ‡¦:progress:R This user is from outside of this forum
                                      RootWyrm πŸ‡ΊπŸ‡¦:progress:R This user is from outside of this forum
                                      RootWyrm πŸ‡ΊπŸ‡¦:progress:
                                      wrote last edited by
                                      #19

                                      @dangoodin the significance is that by their own words, they didn't discover shit. Check the date on that CVE. But they're trying to claim dishonestly that their magical almost-to-AGI stochastic parrot totally discovered it.
                                      It did not. Period.

                                      Dan GoodinD 1 Reply Last reply
                                      0
                                      • RootWyrm πŸ‡ΊπŸ‡¦:progress:R RootWyrm πŸ‡ΊπŸ‡¦:progress:

                                        @dangoodin the significance is that by their own words, they didn't discover shit. Check the date on that CVE. But they're trying to claim dishonestly that their magical almost-to-AGI stochastic parrot totally discovered it.
                                        It did not. Period.

                                        Dan GoodinD This user is from outside of this forum
                                        Dan GoodinD This user is from outside of this forum
                                        Dan Goodin
                                        wrote last edited by
                                        #20

                                        @rootwyrm

                                        I'm not arguing with you. Sorry if it sounds like I am. I don't have the same technical background you do and am asking how the 7.8-severity vuln shouldn't be considered high severity because it involves fonts . . . bounds checking? I'm asking you to explain the reasoning behind your assessment as if I was a student in a security 101 class.

                                        1 Reply Last reply
                                        0
                                        • R ActivityRelay shared this topic
                                        Reply
                                        • Reply as topic
                                        Log in to reply
                                        • Oldest to Newest
                                        • Newest to Oldest
                                        • Most Votes


                                        • Login

                                        • Don't have an account? Register

                                        • Login or register to search.
                                        Powered by NodeBB Contributors
                                        • First post
                                          Last post
                                        0
                                        • Categories
                                        • Recent
                                        • Tags
                                        • Popular
                                        • World
                                        • Users
                                        • Groups