Skip to main content

Use Claude Security

Overview

Claude Security is a capability built into Claude.ai that scans codebases for security vulnerabilities and suggests targeted patches for human review. It helps teams find and fix issues that traditional methods often miss.

Claude Security is now available in public beta for users on Max, Team, and Enterprise plans.

Claude Security allows you to:

  1. Scan your code in parallel — Claude Security understands context, traces data flows across files, and identifies complex, multi-component vulnerability patterns that traditional scanners might not detect.

  2. Validate findings — Every finding goes through multi-stage verification, with Claude challenging its own results before surfacing them. The result: more real issues reported and fewer false positives.

  3. Review and patch — Seamlessly move from a finding into a Claude Code session to review the proposed fix. Resolve vulnerabilities quickly instead of growing a backlog.

Learn how to get started and how leading enterprises use the tool here: Getting started with Claude Security.


Finding types

Finding falls into these example categories below.

Injection (SQL, Command, Code, XSS): Untrusted input changes query structure or gets executed. E.g., ' OR 1=1--, ; rm -rf /, <script> in a comment.

Injection (XXE, ReDoS): Parsers or regex abused by crafted input. E.g., XML <!ENTITY> reading /etc/passwd.

Path & Network (Path traversal, SSRF, Open redirect): Input controls file paths, request destinations, or redirects. E.g., ../../etc/passwd, fetching http://169.254.169.254/.

Auth & Access (AuthN bypass, PrivEsc, IDOR/BOLA, CSRF, Race): Access checks missing, skippable, or racey. E.g., GET /orders/123 returns someone else's order.

Memory Safety (Buffer/integer overflow, UAF, unsafe misuse): Input writes past bounds, wraps arithmetic, or hits freed memory. Mostly C/C++/Rust unsafe.

Cryptography (Timing leaks, algorithm confusion, weak primitives): Secret-dependent branches, JWT alg=none, or MD5/SHA-1/DES/ECB in security paths.

Deserialization (Arbitrary type instantiation): Untrusted bytes drive object construction — pickle, Java readObject, YAML load. Often equals RCE.

Protocol & Encoding (Cache safety, encoding confusion, length-prefix trust): Layers disagree or trust declared sizes. E.g., cache poisoning via Host header.

Severities

Severity is assigned per finding based on exploitability in your codebase, not the category itself—so the same category can land at different severities in different repos.

Severity

Criteria

Typical example

High

Exploitable by an unauthenticated remote attacker against a default deployment, with no meaningful preconditions

Unauthenticated command injection in a public API endpoint

Medium

Exploitable behind authentication, or needs 1–2 realistic preconditions (specific role, known identifier, user interaction)

SQL injection behind auth requiring knowledge of table schema

Low

Needs 3+ preconditions, local-only access, or lacks a concrete demonstrated attack path

Timing side-channel requiring network proximity and thousands of requests

Finding structure

Each finding contains the following fields:

  • Title — short descriptive name of the finding

  • Details — description of what the finding is and why it matters

  • Location — file path and line number, linked to the source

  • Impact — what could go wrong if this isn’t addressed

  • Reproduction steps — ordered list of steps to reproduce or observe the issue

  • Recommended fix — guidance on how to resolve it

  • Severity — HIGH / MEDIUM / LOW

  • Status — Open / Dismissed / Resolved

  • Category — finding type

  • Repository — repository identifier

  • Branch — branch name the finding was produced against

  • Date created — date the finding was created

  • Shown only if the finding was dismissed:

    • Dismissal reason

    • Dismissal note — optional


Frequently asked questions

  • Scan length — Scan time varies based on the repository and the agent's actions.

  • Severity configuration — as of today, severity is not configurable.

  • Non-GitHub repositories — Only repositories hosted on GitHub can be scanned today.

  • No Zero Data Retention (No ZDR) — Anthropic may retain data where required by law or to address Usage Policy violations.

  • Scan consistency — Scans are stochastic by design. Unlike traditional static analyzers, Claude Security uses an agent that adapts its analysis to each run, reasoning over code context rather than applying fixed pattern matches. This enables the depth of analysis needed to catch logic-level vulnerabilities.

  • Exporting findings — You can copy findings, download them as CSV or Markdown, or push them to your own tracking and notification systems via per-project webhooks. See the “getting started” guide.

  • Feedback — Please share your feedback using the in-product feedback icon on the right.

  • IP addresses for Github — Use the following Anthropic guide for IP addresses allowlisting: IP addresses.

Scope of use: You will only use Claude Security to scan code that you or your company owns and to which you or your company holds all necessary rights to scan. You will not use Claude Security to scan code owned by or licensed from third parties, including but not limited to open source projects or repositories other than those included in your company's codebase(s).

Did this answer your question?