Claude Code Security Reviews Introduced for AI-Assisted Development
Summary
Hide ▲
Show ▼
Anthropic has introduced security review features in its Claude Code platform, designed to integrate security checks into AI-assisted development workflows. The new capabilities, now available in a limited research preview, automate the detection and remediation of common vulnerabilities in codebases, leveraging AI to enhance application security. These features are part of a broader trend toward embedding security directly into development tools and pipelines, addressing the challenges posed by AI-assisted coding and 'vibe coding.' The security review function allows developers to run ad hoc checks for vulnerabilities and implement fixes, with the option to integrate these checks into continuous integration/continuous deployment (CI/CD) pipelines. While the initial focus is on classic security issues like SQL injection and cross-site scripting, the tool is expected to evolve, though it is not intended to replace existing security measures. Security experts emphasize the need for a comprehensive approach to application security, combining AI-assisted tools with traditional methods and human oversight to ensure robust protection against emerging threats. The debut of Claude Code Security has impacted share prices of several security companies, highlighting the potential disruptive nature of AI-assisted security tools.
Timeline
-
22.08.2025 16:05 3 articles · 6mo ago
Claude Code Security Reviews Launched for AI-Assisted Development
Anthropic has introduced security review features in its Claude Code platform, designed to automate the detection and remediation of common vulnerabilities in codebases. These features integrate security checks into AI-assisted development workflows, aligning with the trend toward embedding security directly into development tools and pipelines. The initial capabilities focus on classic security issues, with plans to expand coverage over time. Security experts highlight the importance of combining AI-assisted tools with traditional security measures and human oversight to ensure robust protection. The feature is currently available in a limited research preview to Enterprise and Team customers, and it goes beyond static analysis by reasoning the codebase like a human security researcher, understanding how various components interact, and assigning severity and confidence ratings to identified vulnerabilities. The debut of Claude Code Security has impacted share prices of several security companies, highlighting the potential disruptive nature of AI-assisted security tools.
Show sources
- Do Claude Code Security Reviews Pass the Vibe Check? — www.darkreading.com — 22.08.2025 16:05
- Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning — thehackernews.com — 21.02.2026 09:58
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
Information Snippets
-
Anthropic's Claude Code platform now includes security review features that automate the detection and remediation of common vulnerabilities in codebases.
First reported: 22.08.2025 16:052 sources, 3 articlesShow sources
- Do Claude Code Security Reviews Pass the Vibe Check? — www.darkreading.com — 22.08.2025 16:05
- Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning — thehackernews.com — 21.02.2026 09:58
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
-
The security review function can be integrated into CI/CD pipelines to automatically trigger code reviews on every pull request.
First reported: 22.08.2025 16:052 sources, 3 articlesShow sources
- Do Claude Code Security Reviews Pass the Vibe Check? — www.darkreading.com — 22.08.2025 16:05
- Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning — thehackernews.com — 21.02.2026 09:58
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
-
The initial capabilities focus on classic security issues such as SQL injection, cross-site scripting, and authentication flaws.
First reported: 22.08.2025 16:052 sources, 3 articlesShow sources
- Do Claude Code Security Reviews Pass the Vibe Check? — www.darkreading.com — 22.08.2025 16:05
- Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning — thehackernews.com — 21.02.2026 09:58
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
-
Security experts caution that AI-assisted code reviews should complement, not replace, existing security tools and human oversight.
First reported: 22.08.2025 16:052 sources, 3 articlesShow sources
- Do Claude Code Security Reviews Pass the Vibe Check? — www.darkreading.com — 22.08.2025 16:05
- Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning — thehackernews.com — 21.02.2026 09:58
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
-
The new features are part of a broader trend toward embedding security into development tools and pipelines, aligning with platform engineering principles.
First reported: 22.08.2025 16:052 sources, 3 articlesShow sources
- Do Claude Code Security Reviews Pass the Vibe Check? — www.darkreading.com — 22.08.2025 16:05
- Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning — thehackernews.com — 21.02.2026 09:58
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
-
Security professionals will need to guide processes and verify the effectiveness of AI-assisted security tools.
First reported: 22.08.2025 16:052 sources, 3 articlesShow sources
- Do Claude Code Security Reviews Pass the Vibe Check? — www.darkreading.com — 22.08.2025 16:05
- Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning — thehackernews.com — 21.02.2026 09:58
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
-
The Claude security review tool is designed to work alongside other security measures, providing an additional layer of protection.
First reported: 22.08.2025 16:052 sources, 3 articlesShow sources
- Do Claude Code Security Reviews Pass the Vibe Check? — www.darkreading.com — 22.08.2025 16:05
- Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning — thehackernews.com — 21.02.2026 09:58
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
-
Claude Code Security is currently available in a limited research preview to Enterprise and Team customers.
First reported: 21.02.2026 09:582 sources, 2 articlesShow sources
- Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning — thehackernews.com — 21.02.2026 09:58
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
-
Claude Code Security scans codebases for security vulnerabilities and suggests targeted software patches for human review.
First reported: 21.02.2026 09:582 sources, 2 articlesShow sources
- Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning — thehackernews.com — 21.02.2026 09:58
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
-
The feature aims to leverage AI to help find and resolve vulnerabilities to counter attacks where threat actors weaponize the same tools.
First reported: 21.02.2026 09:582 sources, 2 articlesShow sources
- Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning — thehackernews.com — 21.02.2026 09:58
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
-
Claude Code Security goes beyond static analysis by reasoning the codebase like a human security researcher and understanding how various components interact.
First reported: 21.02.2026 09:582 sources, 2 articlesShow sources
- Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning — thehackernews.com — 21.02.2026 09:58
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
-
The identified vulnerabilities undergo a multi-stage verification process to filter out false positives and are assigned a severity rating.
First reported: 21.02.2026 09:582 sources, 2 articlesShow sources
- Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning — thehackernews.com — 21.02.2026 09:58
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
-
The system uses a human-in-the-loop (HITL) approach, where developers make the final call on suggested patches.
First reported: 21.02.2026 09:582 sources, 2 articlesShow sources
- Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning — thehackernews.com — 21.02.2026 09:58
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
-
Claude Code Security provides a confidence rating for each finding to help assess the reliability of the identified vulnerabilities.
First reported: 21.02.2026 09:582 sources, 2 articlesShow sources
- Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning — thehackernews.com — 21.02.2026 09:58
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
-
Claude Code Security's debut impacted share prices of several security companies, including CrowdStrike, JFrog, Zscaler, Datadog, Okta, Fortinet, SentinelOne, and Palo Alto Networks.
First reported: 27.02.2026 16:001 source, 1 articleShow sources
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
-
Claude Code Security uses a human-in-the-loop (HITL) approach, where developers make the final call on suggested patches.
First reported: 27.02.2026 16:001 source, 1 articleShow sources
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
-
Claude Code Security's findings undergo a multi-stage verification process to filter out false positives and are assigned a severity rating.
First reported: 27.02.2026 16:001 source, 1 articleShow sources
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
-
Claude Code Security provides a confidence rating for each finding to help assess the reliability of the identified vulnerabilities.
First reported: 27.02.2026 16:001 source, 1 articleShow sources
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
-
Claude Code Security is not a one-and-done security solution and still requires developers at the helm.
First reported: 27.02.2026 16:001 source, 1 articleShow sources
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
-
Claude Code Security's debut had a notable impact on share prices in the security market, with some companies seeing significant drops.
First reported: 27.02.2026 16:001 source, 1 articleShow sources
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
-
Claude Code Security's debut had a notable impact on share prices in the security market, with some companies seeing significant drops.
First reported: 27.02.2026 16:001 source, 1 articleShow sources
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
-
Claude Code Security's debut had a notable impact on share prices in the security market, with some companies seeing significant drops.
First reported: 27.02.2026 16:001 source, 1 articleShow sources
- Claude Code Security Shows Promise, Not Perfection — www.darkreading.com — 27.02.2026 16:00
Similar Happenings
Claude Code Vulnerabilities Enable Remote Code Execution and API Key Theft
Multiple vulnerabilities in Anthropic's Claude Code AI-powered coding assistant allow remote code execution and API key exfiltration. The flaws exploit configuration mechanisms, including Hooks, Model Context Protocol (MCP) servers, and environment variables. Three vulnerabilities were identified, with fixes released in versions 1.0.87, 1.0.111, and 2.0.65. Exploitation could lead to arbitrary code execution, data exfiltration, and unauthorized access to AI infrastructure. The vulnerabilities highlight the risks associated with AI-powered tools that execute commands and initiate network communication autonomously.
Claude Opus 4.6 Identifies 500+ High-Severity Flaws in Open-Source Libraries
Anthropic's Claude Opus 4.6, a large language model (LLM), discovered over 500 previously unknown high-severity security flaws in major open-source libraries such as Ghostscript, OpenSC, and CGIF. The model, launched on February 6, 2026, demonstrated improved capabilities in code review, debugging, and vulnerability detection. The flaws were identified without requiring task-specific tooling or specialized prompting. Anthropic validated each flaw to ensure they were not hallucinated and prioritized severe memory corruption vulnerabilities. The identified vulnerabilities have since been patched by the respective maintainers.
Malicious OpenClaw AI Coding Assistant Extension on VS Code Marketplace
A malicious Microsoft Visual Studio Code (VS Code) extension named "ClawdBot Agent - AI Coding Assistant" was discovered on the official Extension Marketplace. The extension, which posed as a free AI coding assistant, stealthily dropped a malicious payload on compromised hosts. The extension was taken down by Microsoft after being reported by cybersecurity researchers. The malicious extension executed a binary named "Code.exe" that deployed a legitimate remote desktop program, granting attackers persistent remote access to compromised hosts. The extension also incorporated multiple fallback mechanisms to ensure payload delivery, including retrieving a DLL from Dropbox and using hard-coded URLs to obtain the payloads. Additionally, security researchers found hundreds of unauthenticated Moltbot instances online, exposing sensitive data and credentials. Moltbot, an open-source personal AI assistant, can run 24/7 locally, maintaining a persistent memory and executing scheduled tasks. However, insecure deployments can lead to sensitive data leaks, corporate data exposure, credential theft, and command execution. Hundreds of Clawdbot Control admin interfaces are exposed online due to reverse proxy misconfiguration, allowing unauthenticated access and root-level system access. More than 230 malicious packages for OpenClaw (formerly Moltbot and ClawdBot) have been published in less than a week on the tool's official registry and on GitHub. These malicious skills impersonate legitimate utilities and inject information-stealing malware payloads onto users' systems, targeting sensitive data like API keys, wallet private keys, SSH credentials, and browser passwords. Users are advised to audit their configurations, revoke connected service integrations, and implement network controls to mitigate potential risks. A self-styled social networking platform built for AI agents, Moltbook, contained a misconfigured database that allowed full read and write access to all data. The exposure was due to a Supabase API key exposed in client-side JavaScript, granting unauthenticated access to the entire production database. Researchers accessed 1.5 million API authentication tokens, 30,000 email addresses, and thousands of private messages between agents. The API key exposure allowed attackers to impersonate any agent on the platform, post content, send messages, and interact as that agent. Unauthenticated users could edit existing posts, inject malicious content or prompt injection payloads, and deface the site. SecurityScorecard found 40,214 exposed OpenClaw instances associated with 28,663 unique IP addresses. 63% of observed deployments are vulnerable, with 12,812 instances exploitable via remote code execution (RCE) attacks. SecurityScorecard correlated 549 instances with prior breach activity and 1493 with known vulnerabilities. Three high-severity CVEs in OpenClaw have been discovered, with public exploit code available. OpenClaw instances are at risk of indirect prompt injection and API key leaks, with most exposures located in China, the US, and Singapore. A supply chain attack via the Cline npm package version 2.3.0 installed OpenClaw on users' systems, exploiting a prompt injection vulnerability in Cline's Claude Issue Triage workflow. The compromised Cline package was downloaded approximately 4,000 times over an eight-hour stretch. OpenClaw has broad permissions and full disk access, making it a high-value implant for attackers. Cline released version 2.4.0 to address the issue and revoked the compromised token. The attack affected all users who installed the Cline CLI package version 2.3.0 during an eight-hour window on February 17, 2026. The attack did not impact Cline's Visual Studio Code (VS Code) extension and JetBrains plugin. Cline maintainers released version 2.4.0 to mitigate the unauthorized publication and revoked the compromised token. Microsoft Threat Intelligence observed a small but noticeable uptick in OpenClaw installations on February 17, 2026, due to the supply chain compromise. Users are advised to update to the latest version, check their environment for any unexpected installation of OpenClaw, and remove it if not required.
Google Enhances Chrome Agentic AI Security Against Indirect Prompt Injection Attacks
Google is introducing new security measures to protect Chrome's agentic AI capabilities from indirect prompt injection attacks. These protections include a new AI model called the User Alignment Critic, expanded site isolation policies, additional user confirmation steps for sensitive actions, and a prompt injection detection classifier. The User Alignment Critic independently evaluates the agent's actions, ensuring they align with the user's goals. Google is also enforcing Agent Origin Sets to limit the agent's access to relevant data origins and has developed automated red-teaming systems to test defenses. The company has announced bounty payments for security researchers to further enhance the system's robustness.
State-Backed Hackers Abuse AI Models for Advanced Cyber Attacks
Google's Threat Intelligence Group (GTIG) has identified new malware families that leverage artificial intelligence (AI) and large language models (LLMs) for dynamic self-modification during execution. These malware families, including PromptFlux, PromptSteal, FruitShell, QuietVault, and PromptLock, demonstrate advanced capabilities for evading detection and maintaining persistence. PromptFlux, an experimental VBScript dropper, uses Google's LLM Gemini to generate obfuscated VBScript variants and evade antivirus software. It attempts persistence via Startup folder entries and spreads laterally on removable drives and mapped network shares. The malware is under development or testing phase and is assessed to be financially motivated. PromptSteal is a data miner written in Python that queries the LLM Qwen2.5-Coder-32B-Instruct to generate one-line Windows commands to collect information and documents in specific folders and send the data to a command-and-control (C2) server. It is used by the Russian state-sponsored actor APT28 in attacks targeting Ukraine. State-backed hackers from China (APT31, Temp.HEX), Iran (APT42), North Korea (UNC2970), and Russia have used Gemini AI for all stages of an attack, including reconnaissance, phishing lure creation, C2 development, and data exfiltration. Chinese threat actors used Gemini to automate vulnerability analysis and provide targeted testing plans against specific US-based targets. Iranian adversary APT42 leveraged Gemini for social engineering campaigns and to speed up the creation of tailored malicious tools. The use of AI in malware enables adversaries to create more versatile and adaptive threats, posing significant challenges for cybersecurity defenses. Various threat actors, including those from China, Iran, and North Korea, have been observed abusing AI models like Gemini across different stages of the attack lifecycle. The underground market for AI-powered cybercrime tools is also growing, with offerings ranging from deepfake generation to malware development and vulnerability exploitation.