Anthropic's Internal Model Finds Bugs Hidden Since 1998
“Anthropic's internal code analysis model surfaced critical vulnerabilities in codebases that have been running in production since 1998. One of them was in a library used by every bank in Europe. Sleep well.”

Sally's not done with you yet.
Drop a URL, screenshot, or file and Sally will give you the honest truth.
Sally's Take
The short version: Anthropic pointed an internal Claude variant at a corpus of long-lived open source libraries, and it flagged several buffer handling bugs that had been sitting in production code since the Clinton administration. One of the libraries is a dependency in the payment processing stack used across European banking. Nobody noticed for 27 years. Not Coverity, not Fortify, not any of the humans who read the code.
This is the kind of result that makes security researchers quietly update their resumes. Not because their jobs are gone, but because the bar for what counts as 'audited' just moved. If a model can find 27-year-old bugs, then every 'we audit our dependencies quarterly' claim from every vendor in the last decade is now officially aspirational.
The twist is that Anthropic is not shipping this as a product. It is a research capability they are using internally and disclosing responsibly. Which is either admirable restraint or the setup for the most expensive security-as-a-service offering of the decade. Bet on both.

Think your work can survive this?
Drop a URL, screenshot, or file and Sally will give you the honest truth.
What Actually Happened
- •Anthropic used an internal variant of Claude to analyze widely used open source libraries for security bugs.
- •The model identified several critical memory-handling vulnerabilities in code that had been in production since 1998.
- •One affected library is a dependency in payment processing systems used by major European banks.
- •Anthropic disclosed the bugs to maintainers before publishing the research and is not currently offering this capability as a paid product.
Who Got Burned
Every static analysis vendor that has been charging enterprises six figures a year for tools that did not catch this. Also every compliance auditor who signed off on 'industry best practice' security reviews of the affected libraries.
Silver Lining
The bugs got patched. Coordinated disclosure worked. And the next generation of code analysis tools just got shown exactly what the ceiling looks like, which means the floor is about to rise for everyone.

Your turn. Drop something.
Drop a URL, screenshot, or file and Sally will give you the honest truth.
