Close Menu
geekfence.comgeekfence.com
    What's Hot

    UiPath’s acquisition of WorkFusion marks the shift toward verticalized agentic solutions  – Everest Group Research Portal

    February 21, 2026

    Meet the ISPs Driving FTTH Deployment in South Africa

    February 21, 2026

    Asha Sharma named EVP and CEO, Microsoft Gaming

    February 21, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cyber Security»Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning
    Cyber Security

    Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning

    AdminBy AdminFebruary 21, 2026No Comments2 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Ravie LakshmananFeb 21, 2026Artificial Intelligence / DevSecOps

    Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning

    Artificial intelligence (AI) company Anthropic has begun to roll out a new security feature for Claude Code that can scan a user’s software codebase for vulnerabilities and suggest patches.

    The capability, called Claude Code Security, is currently available in a limited research preview to Enterprise and Team customers.

    “It scans codebases for security vulnerabilities and suggests targeted software patches for human review, allowing teams to find and fix security issues that traditional methods often miss,” the company said in a Friday announcement.

    Anthropic said the feature aims to leverage AI as a tool to help find and resolve vulnerabilities to counter attacks where threat actors weaponize the same tools to automate vulnerability discovery. 

    With AI agents increasingly capable of detecting security vulnerabilities that have otherwise escaped human notice, the tech upstart said the same capabilities could be used by adversaries to uncover exploitable weaknesses more quickly than before. Claude Code Security, it added, is designed to counter this kind of AI-enabled attack by giving defenders an advantage and improving the security baseline.

    Anthropic claimed that Claude Code Security goes beyond static analysis and scanning for known patterns by reasoning the codebase like a human security researcher, as well as understanding how various components interact, tracing data flows throughout the application, and flagging vulnerabilities that may be missed by rule-based tools.

    Each of the identified vulnerabilities is then subjected to what it says is a “multi-stage verification process” where the results are re-analyzed to filter out false positives. The vulnerabilities are also assigned a severity rating to help teams focus on the most important ones.

    The final results are displayed to the analyst in the Claude Code Security dashboard, where teams can review the code and the suggested patches and approve them. Anthropic also emphasized that the system’s decision-making is driven by a human-in-the-loop (HITL) approach.

    “Because these issues often involve nuances that are difficult to assess from source code alone, Claude also provides a confidence rating for each finding,” Anthropic said. “Nothing is applied without human approval: Claude Code Security identifies problems and suggests solutions, but developers always make the call.”



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    The Promptware Kill Chain – Schneier on Security

    February 20, 2026

    Kimwolf Botnet Swamps Anonymity Network I2P – Krebs on Security

    February 19, 2026

    Is it OK to let your children post selfies online?

    February 18, 2026

    Fake CAPTCHA Scam Tricks Windows Users Into Installing Malware

    February 17, 2026

    How Cisco’s partnerships with LISC, Per Scholas are building resilience in Western North Carolina

    February 16, 2026

    Polish hacker charged seven years after massive Morele.net data breach

    February 15, 2026
    Top Posts

    Hard-braking events as indicators of road segment crash risk

    January 14, 202618 Views

    Understanding U-Net Architecture in Deep Learning

    November 25, 202516 Views

    How to integrate a graph database into your RAG pipeline

    February 8, 202610 Views
    Don't Miss

    UiPath’s acquisition of WorkFusion marks the shift toward verticalized agentic solutions  – Everest Group Research Portal

    February 21, 2026

    UiPath’s acquisition of WorkFusion reflects the ongoing shift in automation from horizontal enablement to vertically specialized, agentic…

    Meet the ISPs Driving FTTH Deployment in South Africa

    February 21, 2026

    Asha Sharma named EVP and CEO, Microsoft Gaming

    February 21, 2026

    How to Use the REXX LISTDSI Function to Get z/OS Dataset Information Quickly and Easily

    February 21, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    UiPath’s acquisition of WorkFusion marks the shift toward verticalized agentic solutions  – Everest Group Research Portal

    February 21, 2026

    Meet the ISPs Driving FTTH Deployment in South Africa

    February 21, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.