Want more intelligent visions of your inbox? Subscribe to our weekly newsletters to get what is concerned only for institutions AI, data and security leaders. Subscribe now
man Firing Introduction security review Her capabilities Claude icon The platform on Wednesday, providing tools that can examine the software instructions for weak competitions and suggests reforms as artificial intelligence greatly accelerates software development throughout the industry.
the New features Companies are increasingly reaching artificial intelligence to write a code faster than ever, which raises critical questions about whether security practices can keep pace with AI. The Antarbur solution combines a safety analysis directly in the functioning of developers through simple Peripheral Automatic Jaithb reviews.
“People love Claude’s code, and they like to use models to write code, and these models are already good and improved,” said Logan Graham, a member of the Red Border Team in the Antarbur who led the development of safety features, in an interview with Venturebeat. “It seems really possible that in the next two years, we will go to 10x, 100x, 1000x the amount of code that is written in the world. The only way to keep up with this is to use the same forms to learn how to make them safe.”
This announcement comes just one day after the Antarbur version Claude Obus 4.1An upgraded version of the most powerful artificial intelligence model that shows significant improvements in coding tasks. The timing emphasizes intensive competition between artificial intelligence companies, with Openai GPT-5 is expected to be announced With pleasure and strong guests Globing fishing talent With signing bonuses worth $ 100 million.
Artificial intelligence limits its limits
Power caps, high costs of the symbol, and inference delay are reshaped. Join our exclusive salon to discover how the big difference:
- Transforming energy into a strategic advantage
- Teaching effective reasoning for real productivity gains
- Opening the return on competitive investment with sustainable artificial intelligence systems
Securing your place to stay in the foreground: https://bit.ly/4mwngngo
Why does the symbol of artificial intelligence create a huge security problem
Safety tools deal with increasing interest in the software industry: since artificial intelligence models become more able to write software instructions, the size of the code that is produced is the explosion, but traditional safety reviews have not been limited. Currently, safety reviews depend on human engineers who manually study a code for security gaps-a process that cannot keep pace with the directing created by artificial intelligence.
Anthropistic approach uses artificial intelligence to solve the created problem. The company has developed two supplementary tools that benefit from the capabilities of Claude to automatically determine vulnerabilities, including SQL injection risks, text programming points, authentication defects, and unsafe data processing.
the The first tool he /security-review
Which developers can run from their station to wipe the symbol before committing it. “It is literally 10 of the key strikes, then it will lead to the appointment of Claude’s agent to review the code you write or your warehouse,” explained Graham. The system analyzes the code and the high -confident security vulnerability assessments are due to the proposed reforms.
the The second component he Jetb This automatically performs safety reviews when developers submit withdrawal requests. The system publishes comments guaranteed on the code with security concerns and recommendations, ensuring every change of a symbol that receives a basic safety review before reaching production.
How did the anthropier tested the safety scanner of its weak symbol
Anthrop was tested after these tools internally on their code, including Claude icon It itself provides the realization of the real world’s health from its effectiveness. The company shared specific examples of the weaknesses discovered by the system before reaching production.
In one case, the engineers built an advantage of an internal tool that started a local HTTP server dedicated to local communications only. the Jetb The executable security vulnerability is determined by the remote implementation of the code through DNS attacks, which were repaired before the code is combined.
Another example included a system of designer designed to manage internal accreditation data safely. The automatic review mark was placed on the fact that the agent was vulnerable SSRf forgery attacks (SSRF)Which leads to immediate repair.
“We used to use it, and he actually found weaknesses and defects and suggested how to fix them in things before they reached production for us,” Graham said. “We thought, hey, this is so useful that we decided to publicly issue it.”
In addition to facing the scale challenges facing large companies, the tools can give advanced security practices for the smaller development teams that lack the dedicated security personnel.
“One of the things that makes me more enthusiastic is that this means that the security review can be easily democratic even with the smallest teams, and these small teams can pay a lot of code that will have more and more faith,” Graham said.
The system is designed to be available immediately. According to Graham, developers can start using the safety review feature within seconds of the version, which requires launching about 15 key. The tools are smoothly integrated with the current workflow, and the processing code processing locally through the same CLAUDE application programming interface that operates other CLADE icon features.
Inside the artificial intelligence structure that wipes millions of code lines
The safety review system works by calling Claud through the “Agentic loop” that systematically analyzes the code. According to the anthropologist, Claude icon Tool calls are used to explore the rules of large symbols, starting with understanding the changes made in requesting withdrawal and then exploring a broader code base in a proactive way to understand the context, stabilizing security, and potential risks.
Institutional customers can allocate safety rules to match their specific policies. The system is built on the extension Clauds code, allowing the teams to adjust the current safety claims or create completely new wiping orders through simple discount documents.
“You can look at Slash orders, because Slash’s orders are often turned on, in fact, just CLAUDE.MD DOC,” made clear. “It is really easy for you to write yourself too.”
$ 100 million of talent war to reshape the development of artificial intelligence security
The security declaration comes amid the broadest industry account of the integrity of artificial intelligence and responsible publishing. Modern research from man has explored techniques to prevent artificial intelligence models from developing harmful behaviors, including controversial “vaccination” approach that displays models for unwanted features during training to build flexibility.
The timing also reflects the intense competition in the area of artificial intelligence. Antarbur has been released Claude Obus 4.1 On Tuesday, with the company’s demanding significant improvements in software engineering tasks-more than 74.5 % on SWE, compared to 72.5 % of the previous Claude Obus model.
Meanwhile, Meta was strongly employed with the talents of artificial intelligence with huge signing bonuses, although the CEO of anthropologist Dario Amodei recently stated this. Many of his employees rejected these offers. The company keeps 80 % employee retention rate It has been employed over the past two years, compared to 67 % in Openai and 64 % in Meta.
Government agencies can now buy Claude as AI’s accreditation is accelerated
Safety features are part of the broader propulsion of anthropology in the markets market. Over the course of last month, the company has shipped multiple features that focus on institutions for CLADE code, including analysis information boards for officials, original Windows support and multi -religiosity support.
The United States government also supported the institution’s accreditation data, adding the company to the Public Services Department List of accredited sellers Besides Openai and Google, which makes Claude available for federal agency purchases.
Graham confirmed that safety tools are designed to complete the current security practices, not replace them. “Not one will solve the problem. This is just one additional tool,” he said. However, she has expressed confidence that the Acting Safety tools will play an increasingly central role as the code generates.
The race to secure programs created from artificial intelligence before breaking the Internet
Since Amnesty International is re -developed software at an unprecedented pace, the human security initiative is an important recognition that the same technology that leads explosive growth in the generation of the code must be harnessed to keep this symbol safely. The Graham team, which is called the Frontier Red team, is focusing on the potential risks of advanced artificial intelligence capabilities and building appropriate defenses.
“We have always been very committed to measuring cybersecurity capabilities of models, and I think it is time for defenses to be increasingly in the world,” Graham said. The company in particular encourages cybersecurity and independent researchers to experience the creative applications of technology, with the aim of an ambition to use artificial intelligence “review, correct or make all the most important programs that operate the infrastructure in the world.”
Security features are immediately available to everyone Claude icon Users, with a one -time composition requires one time by development teams. But the biggest question that is looming on the horizon in the industry remains: Can the off -a -acting defenses to be widen enough to match the si growth in the weaknesses that artificial intelligence generates?
At the present time, at least, machines are racing to fix other machines that you may break.
https://venturebeat.com/wp-content/uploads/2025/08/nuneybits_Vector_art_of_a_computer_code_on_a_retro_computer_scr_e70af89f-d17f-4281-a0b6-bdb31afcdc6f.webp?w=857?w=1200&strip=all
Source link