Claude Opus 4.5 Identifies 22 Vulnerabilities in Firefox Within Two Weeks

In Crypto Regulations
March 07, 2026

Claude Opus 4.5 Identifies 22 Vulnerabilities in Firefox Within Two Weeks

The Anthropic team, using the AI model Claude, identified 22 vulnerabilities in the Firefox browser, 14 of which were classified by Mozilla, the developer company, as high severity.

This figure accounts for approximately one-fifth of similar issues discovered in the popular web browser throughout 2025.

Researchers at Anthropic used Claude Opus 4.5 over two weeks to search for vulnerabilities in Firefox. The team explained their choice of browser for the experiment, noting it is one of the most tested and secure open-source projects with a high level of complexity.

Initially, developers focused their efforts on the JavaScript engine, as it can be analyzed in isolation, before expanding the model’s work to other parts of the codebase.

After just 20 minutes of research, Claude reported finding a Use After Free vulnerability, which allows attackers to replace data with arbitrary content. 

In total, the LLM scanned nearly 6,000 C++ code files and submitted 112 problem reports. Most of these were fixed by the browser team in Firefox version 148, released in February. Patches for the remaining issues will be included in future releases.

According to Anthropic specialists, after the collaboration, Mozilla researchers began independently experimenting with using Claude for security purposes.

The AI company acknowledged that the model proved more effective at finding vulnerabilities than attempting to exploit them. Developers asked Claude to demonstrate a real attack via the Use After Free vector.        

“We conducted this test several hundred times with different starting points, spending about $4,000 on API credits. Despite this, Opus 4.6 was able to turn a vulnerability into an exploit only twice,” they stated.

Anthropic noted that this situation currently provides an advantage to cybersecurity specialists using AI. However, the fact that the LLM managed to create a primitive malware “raises concerns.”

In February, vibe-coding through Claude Opus 4.6 led to the hacking of the Moonwell DeFi project, resulting in a $1.78 million loss.

Avatar photo
/ Published posts: 480

Steven M. Crimmins is a cryptocurrency strategist and freelance writer who has followed the blockchain industry since Bitcoin’s early days. Known for his sharp analysis of altcoins and trading strategies, Steven provides Satoshi News Africa readers with market-focused content grounded in research. He is especially interested in how African traders are adopting crypto as an alternative to traditional markets. Steven is also a podcast host, where he discusses emerging technologies and investment trends.