How Claude managed to
"discover" these backdoors and bugs:
1.
Large-Scale Automated Auditing (The "Claude Code" Era)
In early 2026, security researchers (notably Nicholas
Carlini) used Claude Code—a specialized version of the model for
coding—to scan the entire Linux Kernel.
- The
Method: They didn't just ask Claude "is this safe?" Instead,
they ran a script that fed every single file of the Linux Kernel into the
model with a prompt essentially saying: "You are in a security
competition. Find a vulnerability in this file."
- The
Result: Claude found multiple zero-day vulnerabilities (bugs
that were previously unknown), including one that had been hidden in the
Linux code for 23 years.
2.
Bypassing "Complexity" (How it beats humans)
Traditional tools (called "fuzzers" or
"static analyzers") often struggle with complex logic. They might
find a simple crash, but they can't understand why it's happening.
- Contextual
Intelligence: Claude can read the code and understand the intent.
In one instance, it found a bug in the NFS (Network File System) protocol
because it understood that a 1024-byte ID was "legal" by the
rules of the protocol but would overflow the specific memory buffer the
developer had created.
- Verification:
Claude doesn't just guess. Researchers have used it in a pipeline: Claude
finds a potential bug → Claude writes a script to test if the bug is real
→ The script crashes the system → The bug is confirmed.
3. The
"Mythos" Model (2026)
Anthropic recently released a specialized version called Claude
Mythos Preview specifically for security testing.
- Deep
Chains: Unlike previous AI, this version can "chain"
multiple small, innocent-looking bugs together to create a massive
backdoor.
- Finding
the "Invisible": It recently found a 27-year-old bug in
OpenBSD. This was shocking because OpenBSD is considered the most
secure OS in the world. Humans had looked at that code for nearly three
decades and saw nothing wrong, but the AI's ability to simulate millions
of mathematical paths through the code allowed it to spot the flaw.
Why
this is different from the XZ Backdoor
The XZ Backdoor was a "social engineering"
attack where a human hacker (Jia Tan) spent two years pretending to be a
helpful contributor to get malicious code into the system.
- The
Human discovery (XZ): A human noticed the code was 0.5 seconds slower
than usual.
- The
AI discovery (Claude): The AI doesn't need to see a "lag."
It looks at the mathematical logic of the code and says, "Wait, if
I send a packet with this specific size at this specific time, the
security check will fail."
The
"Double-Edged Sword"
This is why the cybersecurity world is currently in a bit of
a panic. If Claude can find a 23-year-old backdoor in a few hours, it means:
- Defenders
can use it to patch everything and make software incredibly secure.
- Attackers
(who are already using Claude and other models) can find new "master
keys" to systems before anyone else does.
Comments
Post a Comment