Anthropic finds 22 Firefox vulnerabilities using Claude Opus 4.6
What Happened
Anthropic's Claude Opus 4.6 identified 22 vulnerabilities in Firefox during a security research exercise, including a critical use-after-free bug discovered in under 20 minutes. The findings accounted for nearly one-fifth of all high-severity Firefox patches issued in 2025. The result establishes AI-assisted vulnerability discovery as a credible tool alongside traditional manual security review.
Our Take
Okay, this one I'm not going to brush off. Twenty-two real vulnerabilities in Firefox — not a toy app, not a demo — an actual production browser with millions of users and decades of hardened C++ code. That use-after-free found in 20 minutes? Memory bugs like that are what senior security engineers spend days hunting.
Nearly a fifth of Firefox's high-severity patches last year came from a model. Let that sit. Security firms charge $200/hr for this kind of work, and we're building products while supposedly competing with them.
Here's the thing — we've been treating AI as code autocomplete. We should be running it against our own codebases before we ship, not as a vibe check, but as a serious second pass on memory safety, auth logic, and injection vectors.
We're a small team. We don't have a dedicated security engineer. This is exactly the gap Opus-class models can fill right now — and ignoring it means we're leaving real issues in production that a 20-minute automated pass would catch.
What To Do
Add a pre-merge step that pipes your PR diff to Claude Opus 4.6 with a prompt targeting use-after-free patterns, injection vectors, and authentication bypasses — even a basic implementation will catch what manual review misses.
Cited By
React