{"id":245,"date":"2026-02-07T18:55:33","date_gmt":"2026-02-07T16:55:33","guid":{"rendered":"https:\/\/vittrup-graversen.dk\/?p=245"},"modified":"2026-03-28T12:11:11","modified_gmt":"2026-03-28T10:11:11","slug":"claude-opus-4-6-finder-500-zero-day-saarbarheder-i-open-source-uden-specialvaerktoej","status":"publish","type":"post","link":"https:\/\/vittrup-graversen.dk\/index.php\/2026\/02\/07\/claude-opus-4-6-finder-500-zero-day-saarbarheder-i-open-source-uden-specialvaerktoej\/","title":{"rendered":"Claude Opus 4.6 Finder 500+ Zero-Day S\u00e5rbarheder i Open Source \u2014 Uden Specialv\u00e6rkt\u00f8j"},"content":{"rendered":"\n<p><strong>Anthropic har med lanceringen af Claude Opus 4.6 den 5. februar 2026 demonstreret noget, der kan \u00e6ndre cybersecurity-landskabet fundamentalt:<\/strong> Modellen har fundet over 500 hidtil ukendte zero-day s\u00e5rbarheder i open source-kode \u2014 helt uden specialiserede instruktioner eller custom tooling.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Hvad skete der?<\/h2>\n\n\n\n<p>Anthropics Frontier Red Team placerede Opus 4.6 i et sandboxed VM-milj\u00f8 med adgang til standard udviklingsv\u00e6rkt\u00f8jer og Python. Ingen specialinstruktioner. Ingen forudindl\u00e6st viden om specifikke s\u00e5rbarheder. Bare &#8220;out-of-the-box&#8221; capabilities.<\/p>\n\n\n\n<p>Resultatet? Over 500 validerede zero-day vulnerabilities i kritisk open source-infrastruktur. Hver eneste blev verificeret af enten Anthropics team eller eksterne sikkerhedsforskere.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tre bem\u00e6rkelsesv\u00e6rdige fund<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">GhostScript: Git History som angrebsvektor<\/h3>\n\n\n\n<p>Da fuzzing og manuel analyse ikke gav resultater i GhostScript (en udbredt PostScript\/PDF-processor), skiftede Claude strategi og analyserede projektets Git commit-historik. Modellen identificerede et commit relateret til stack bounds checking for font-h\u00e5ndtering og r\u00e6sonnerede: <em>&#8220;Hvis bounds checking blev tilf\u00f8jet her, var koden f\u00f8r det commit s\u00e5rbar.&#8221;<\/em> Claude fandt derefter tilsvarende upatched vulnerabilities i andre code paths \u2014 specifikt en funktion i <code>gdevpsfx.c<\/code> der manglede den bounds checking, som var blevet tilf\u00f8jet andetsteds.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">OpenSC: Klassisk buffer overflow i smart card-kode<\/h3>\n\n\n\n<p>For OpenSC, et smart card data processing-v\u00e6rkt\u00f8j, identificerede Claude multiple <code>strcat<\/code>-operationer der konkatenerede strenge uden korrekt l\u00e6ngdevalidering. Modellen forstod at en 4096-byte buffer kunne overflowe under specifikke betingelser. Traditionelle fuzzere havde sj\u00e6ldent testet denne code path p\u00e5 grund af dens mange preconditions \u2014 men Claude fokuserede direkte p\u00e5 det s\u00e5rbare fragment.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">CGIF: Deep algorithmic reasoning<\/h3>\n\n\n\n<p>Det mest imponerende fund var i CGIF-biblioteket. Claude opdagede en s\u00e5rbarhed der kr\u00e6vede dyb forst\u00e5else af LZW-komprimeringsalgoritmen brugt i GIF-filer. Modellen gennemskuede at CGIF antog, at komprimeret data <em>altid<\/em> ville v\u00e6re mindre end originalen \u2014 normalt en sikker antagelse. Men Claude konstruerede en proof-of-concept der bevidst maxede LZW symbol-tabellen for at fremtvinge &#8220;clear&#8221; tokens, hvilket udl\u00f8ste en buffer overflow.<\/p>\n\n\n\n<p>Denne s\u00e5rbarhed er s\u00e6rlig signifikant fordi selv 100% line- og branch coverage fra traditionel testing ikke ville have opdaget den. Den kr\u00e6ver en meget specifik sekvens af operationer der foruds\u00e6tter konceptuel forst\u00e5else af algoritmen.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Hvorfor det betyder noget for udviklere<\/h2>\n\n\n\n<p>Traditionel fuzzing bombarderer kode med tilf\u00e6ldige inputs. Claude Opus 4.6 bruger derimod menneskelignende r\u00e6sonnering: den l\u00e6ser Git commit-historik, analyserer kodem\u00f8nstre og forst\u00e5r programmeringslogik for at konstruere m\u00e5lrettede exploits. I test mod nogle af de mest intensivt fuzzede codebases \u2014 projekter med millioner af CPU-timer investeret i automatiseret test \u2014 fandt Claude high-severity vulnerabilities der havde v\u00e6ret skjult i \u00e5rtier.<\/p>\n\n\n\n<p>Logan Graham, leder af Anthropics Frontier Red Team, udtaler: <em>&#8220;Jeg ville ikke blive overrasket, hvis dette bliver en af \u2014 eller den prim\u00e6re m\u00e5de \u2014 open source-software sikres i fremtiden.&#8221;<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Implikationer for agentic engineering<\/h2>\n\n\n\n<p>For dem der arbejder med agentic coding og AI-assisteret udvikling, er der flere takeaways:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Security-as-a-capability:<\/strong> AI-modeller er ikke l\u00e6ngere kun code completion \u2014 de er aktive sikkerhedsaudit\u00f8rer der kan finde bugs ingen fuzzer ville opdage.<\/li>\n\n\n\n<li><strong>Git history som kontekst:<\/strong> Claudes tilgang med at analysere commit-historik viser v\u00e6rdien af at give AI-agenter adgang til hele projektets kontekst, ikke bare den aktuelle kodebase.<\/li>\n\n\n\n<li><strong>Adaptive thinking:<\/strong> Opus 4.6 introducerer fire effort-niveauer (Low, Medium, High, Max), s\u00e5 man kan balancere cost vs. thoroughness i security-scanning.<\/li>\n\n\n\n<li><strong>Agent Teams i Claude Code:<\/strong> Med <code>CLAUDE_CODE_EXPERIMENTAL_AGENT_TEAMS=1<\/code> kan man spinne multiple subagents op der arbejder parallelt \u2014 relevant for at scanne store codebases systematisk.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">De h\u00e5rde tal<\/h2>\n\n\n\n<p>Opus 4.6 scorer 65.4% p\u00e5 Terminal-Bench 2.0 (den h\u00f8jeste score nogen model har opn\u00e5et i agentic coding evaluation), 76% p\u00e5 MRCR v2 med 1M token context, og 1.606 Elo p\u00e5 GDPval-AA \u2014 144 Elo-point foran GPT-5.2 i enterprise-tasks.<\/p>\n\n\n\n<p>Anthropic har tilf\u00f8jet seks nye cybersecurity-probes for at detektere potentielt skadelig brug af disse capabilities, og planl\u00e6gger real-time interventioner mod misbrug.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Kilder<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.axios.com\/2026\/02\/05\/anthropic-claude-opus-46-software-hunting\" target=\"_blank\" rel=\"noopener\">Axios: Anthropic&#8217;s Claude Opus 4.6 uncovers 500 zero-day flaws<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/cybersecuritynews.com\/claude-opus-4-6-released\/\" target=\"_blank\" rel=\"noopener\">CyberSecurity News: Claude Opus 4.6 Released with Improved Cybersecurity<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.marc0.dev\/en\/blog\/claude-opus-4-6-everything-new-agent-teams-1m-context-500-zero-days-found-1770316348293\" target=\"_blank\" rel=\"noopener\">Marc0.dev: Claude Opus 4.6 \u2014 Benchmarks, Agent Teams &amp; What Actually Changed<\/a><\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Claude Opus 4.6 finder 500+ zero-day s\u00e5rbarheder i open source uden specialv\u00e6rkt\u00f8j. AI som sikkerhedsresearcher.<\/p>\n","protected":false},"author":1,"featured_media":244,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[23],"class_list":["post-245","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-agentic-engineering","tag-claudecode"],"acf":[],"_links":{"self":[{"href":"https:\/\/vittrup-graversen.dk\/index.php\/wp-json\/wp\/v2\/posts\/245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vittrup-graversen.dk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vittrup-graversen.dk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vittrup-graversen.dk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vittrup-graversen.dk\/index.php\/wp-json\/wp\/v2\/comments?post=245"}],"version-history":[{"count":2,"href":"https:\/\/vittrup-graversen.dk\/index.php\/wp-json\/wp\/v2\/posts\/245\/revisions"}],"predecessor-version":[{"id":1072,"href":"https:\/\/vittrup-graversen.dk\/index.php\/wp-json\/wp\/v2\/posts\/245\/revisions\/1072"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vittrup-graversen.dk\/index.php\/wp-json\/wp\/v2\/media\/244"}],"wp:attachment":[{"href":"https:\/\/vittrup-graversen.dk\/index.php\/wp-json\/wp\/v2\/media?parent=245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vittrup-graversen.dk\/index.php\/wp-json\/wp\/v2\/categories?post=245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vittrup-graversen.dk\/index.php\/wp-json\/wp\/v2\/tags?post=245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}