~/today's vibe
Published on

Claude Found Bugs, Cybersecurity Stocks Crashed 9%

Authors
  • avatar
    Name
    오늘의 바이브
    Twitter

$15 Billion Vanished in One Day

Security padlock and digital circuits — A single announcement from Anthropic evaporated $15 billion in cybersecurity market cap

When the Nasdaq closed on Friday, February 20, 2026, silence fell over the cybersecurity industry. CrowdStrike down 8%, Cloudflare down 8.1%, Okta down 9.2%, SailPoint down 9.4%. The hardest hit was JFrog, a software supply chain security firm, which saw its stock crash 24.6% in a single day. The Global X Cybersecurity ETF (BUG) dropped 4.9%, reaching its lowest point since November 2023. The total market cap evaporated from the cybersecurity sector reached $15 billion.

The cause was not an earnings warning, not a breach, not regulatory news. It was a single product announced by Anthropic that morning. The name: Claude Code Security. An AI tool that scans codebases to find security vulnerabilities and suggests patches. Anthropic stated the tool had already found over 500 high-risk vulnerabilities in open-source projects. Among them were zero-days that had been missed by human experts and existing security tools for decades.

The market did not interpret this announcement as a mere product launch. It read it as a challenge to the very reason for the cybersecurity industry's existence.


What Makes Claude Code Security Different

Existing security scanners rely on rule-based static analysis (SAST). They register known vulnerability patterns in a database and raise alerts when those patterns appear in code. They catch things like exposed credentials, outdated encryption algorithms, and typical SQL injection patterns. Effective, but limited. They cannot find vulnerabilities not in the pattern database.

Claude Code Security takes a fundamentally different approach. Instead of matching code against patterns, it reads and reasons like a human security researcher. It understands how application components interact and tracks how data flows through systems. This means it can detect complex vulnerabilities like business logic flaws, authentication bypasses, and privilege escalation.

The GhostScript case disclosed by Anthropic's Frontier Red Team illustrates this difference. After existing fuzzing tools and manual analysis failed, Claude Opus 4.6 took an entirely different strategy. It searched not the code itself but the Git commit history. It found a security commit related to "stack boundary checks" and from that context discovered a hidden vulnerability in Type 1 charstring's MM blend value handling. An approach a human might take, but one that existing automation tools never attempt.

Discovered vulnerabilities go through a multi-stage validation process. Claude reviews its own findings to filter false positives and assigns severity grades and confidence scores. It then explains the cause and impact of the vulnerability in natural language and proposes specific patch code. Final application must be approved by a human. Anthropic emphasized, "Nothing is applied without human approval."


500 Zero-Days, Hidden for Decades

Monitor screen displaying code — The 500+ vulnerabilities Claude found were missed by human experts and existing tools for decades

The numbers tell a story. Claude Opus 4.6 found over 500 high-risk vulnerabilities in open-source codebases. These codebases had been running in production environments for years, even decades. Reviewed by countless developers, scanned by existing security tools, and passed by professional security audits.

Anthropic is following responsible disclosure procedures through red.anthropic.com. It notifies project maintainers first and publishes details only after patches are deployed. As of February 20, initial patches have already started rolling out, and collaboration with maintainers continues for remaining vulnerabilities.

What shocked the market was not just the volume. The core issue is that these vulnerabilities were in the blind spots of existing security tools. Commercial SAST tools like Snyk, Veracode, and Checkmarx scanned the same code for years but caught none of them. This is evidence of structural limitations in the approach of existing tools.

More notable is the discovery process. According to Anthropic, Opus 4.6 achieved these results "without task-specific tooling, custom scaffolding, or specialized prompting." A general-purpose AI model using general-purpose reasoning surpassed security specialists. The research was led by the 15-person Frontier Red Team, a group that has been stress-testing advanced AI systems for years, adding credibility to the results.

Frontier Red Team leader Logan Graham told Fortune, "We clearly recognize this as a dual-use capability." The ability to find vulnerabilities can be used for defense or attack. That's why Anthropic implemented safeguards to detect malicious use. Graham added, "It's really important to give defenders a clear advantage."

Claude Code Security starts as a limited research preview for Enterprise and Team customers. Notably, it provides free priority access to open-source maintainers. This design ensures open-source projects with limited resources benefit first. It reads as a strategy to strengthen the weakest link in the software supply chain first.


Why the Market Panicked

Stock chart screen showing red — $15 billion evaporated from the cybersecurity sector in a single day

To understand the February 20 sell-off, look first at the business models of cybersecurity firms. Companies like CrowdStrike, Palo Alto Networks, and Zscaler generate billions in revenue from annual subscriptions. Enterprise customers pay them massive sums each year for endpoint protection, network security, and vulnerability management. This model rests on one assumption: security is a high-value service only specialist vendors can provide.

Claude Code Security cracked that assumption. If AI can find more vulnerabilities faster than existing tools, the reason to pour millions annually into security software diminishes. Investors immediately reflected this logic in stock prices.

The magnitude of declines reveals market interpretation.

StockDropDomain
JFrog (FROG)-24.6%Software supply chain security
SailPoint (SAIL)-9.4%Identity governance
Okta (OKTA)-9.2%Authentication/access mgmt
Cloudflare (NET)-8.1%Network/app security
CrowdStrike (CRWD)-8.0%Endpoint security
Zscaler (ZS)-5.5%Zero trust network
BUG ETF-4.9%Entire cybersecurity sector

JFrog's drop is overwhelmingly large for a reason. JFrog's core business is software artifact management and supply chain security. If Claude Code Security directly finds vulnerabilities in codebases and suggests patches, it becomes direct competition with JFrog's security scanning features. The market judged JFrog would suffer the most.

Interestingly, this is the second enterprise software sell-off Anthropic triggered in a month. Previously, the Claude Cowork plugin announcement shook productivity software stocks. A pattern is emerging where each product announcement from an AI company directly hits a specific sector of the existing software industry.


Overreaction or Justified Panic?

The trading day after the sell-off, Barclays analysts issued a report. The conclusion was firm. This sell-off was "illogical." Barclays argued Claude Code Security does not directly compete with the existing security firms they cover. Code vulnerability scanning is a tiny fraction of the cybersecurity market, and it's a different business domain from CrowdStrike's endpoint protection or Zscaler's zero trust network.

A fair point. What Claude Code Security does is narrowly SAST territory. CrowdStrike does runtime threat detection, Okta does identity management, Cloudflare does network security. Finding bugs in code versus stopping intrusions in real-time are completely different problems. Even if code has no vulnerabilities, social engineering attacks cannot be stopped, and insider threats are unrelated to code scanning.

But dismissing market panic as mere ignorance is difficult. There are reasons.

First, the problem of boundary erosion. Claude Code Security currently does only code scanning, but nothing prevents the same technology from expanding to runtime analysis, log analysis, or network traffic analysis. If AI can "read and reason" about code, reading and reasoning about logs is technically feasible. If Anthropic entered code security today, there's no guarantee it won't enter endpoint security tomorrow.

Second, price disruption potential. Existing security tools charge millions annually in enterprise licenses. Claude Code Security uses API call-based billing. If scanning the same codebase costs 1/10 of existing tools, enterprise customers will reallocate budgets.

Third, OpenAI's precedent exists. Four months ago, OpenAI launched Aardvark, a similar security tool. Two AI companies entering the security market in succession signals this is not a temporary experiment but strategic direction. AI companies see security as a new revenue stream.

Raymond James analysts assessed the JFrog sell-off as "excessive" while acknowledging the rise of AI-based security tools poses long-term risk to existing vendors.


The Dilemma of Existing Security Vendors

Server room security infrastructure — Existing security vendors face a crisis in their decades-old business models

Existing security vendors face a dual dilemma. If they don't adopt AI, they fall behind. If they do, they struggle to justify their premium pricing.

CrowdStrike has already integrated AI features into its platform. It operates its own AI assistant called Charlotte AI and uses machine learning for threat detection. Palo Alto Networks offers AI-based security operations through Cortex XSIAM. But their AI is an add-on feature operating within their own platform. Not an independent tool like Claude Code Security.

The problem is the generality of AI models. CrowdStrike's AI is trained on CrowdStrike data and works only on the CrowdStrike platform. Claude Opus 4.6 has general-purpose reasoning capability applicable to any codebase, any environment. If existing vendors' AI is narrow, domain-specific AI, Anthropic's approach is solving security problems with general-purpose reasoning.

Calcalist's in-depth analysis described the situation as "the cybersecurity industry's foundation is shaking, but it's also an opportunity." Instead of competing with AI companies, existing security vendors can integrate AI company tools into their platforms. A scenario where CrowdStrike adopts Claude Code Security as the code scanning engine for its Falcon platform is theoretically possible.

But that choice is a double-edged sword. Depending on an AI company for core functions leaves you helpless when that AI company launches competing products or raises prices. It's the same dilemma as Apple putting Claude in Xcode. Accept external technology but avoid dependency — a difficult tightrope walk.

One advantage for security vendors is regulation and compliance. Enterprises in finance, healthcare, and defense require specific security certifications (SOC 2, ISO 27001, FedRAMP, etc.). Moving away from security platforms with those certifications is difficult. No matter how superior Claude Code Security is, it will take time to become part of regulator-approved security frameworks.


The Real War Has Just Begun

Was the February 20 sell-off an overreaction? In the short term, yes. Claude Code Security is still in research preview stage and not positioned to immediately cannibalize CrowdStrike's revenue. Like Barclays' analysis, code scanning and endpoint security are different markets.

But in the long term, market instincts may not be wrong. The fact that AI can read and reason about code like a human shakes assumptions across not just security but the entire software industry. Code review, quality control, compliance verification, architecture analysis. Every domain where human expert "reasoning" was the source of value becomes subject to revaluation.

Anthropic positioned Claude Code Security as a defender's tool. Providing cutting-edge capabilities to defenders before attackers. This framing is strategically sophisticated. It avoids making enemies of existing security market players while simultaneously highlighting their technical limitations. It says "we're not competitors but complements," while substantively presenting 500 missed vulnerabilities as evidence.

The $15 billion market cap evaporation symbolizes a new tension between AI and the existing software industry. Claude Cowork shook productivity software, Claude Code Security shook security software. What's next? Each time Anthropic makes an announcement, nobody knows which Wall Street sector will shudder.

Security industry experts are also sensing this trend. Semgrep's technical blog published experimental results on web application vulnerability detection using Claude Code and OpenAI Codex, acknowledging AI tools as valid "complementary layers" to existing static analysis. DefectDojo began officially supporting agentic security workflows integrating Claude Code with its vulnerability management platform. Signals that the existing security ecosystem is moving to absorb AI, not reject it.

One thing is certain. Whether CrowdStrike and Okta stocks rebound or fall further, the way AI understands software has crossed a point of no return. The real war in the security industry is not in stock prices but at the boundary of technology. And that boundary is moving toward AI every month.


Sources: