AI-Driven Code Analysis: What Claude Code Security Can—and Can’t—Do

Modern software development and IT operations teams deploy software at accelerating speeds. That velocity expands the cybersecurity attack surface: vulnerabilities missed during code development and deployment propagate rapidly through systems, creating entry points for data breaches, ransomware campaigns, and supply chain compromises. New artificial intelligence (AI) tools offer a potential mitigation, aiming to automate vulnerability discovery, reduce triage burdens, and shift security efforts earlier in the software development lifecycle. 

On February 20, 2026, Anthropic released such a tool, Claude Code Security, as a limited research preview. The tool scans codebases for security vulnerabilities and recommends software patches for human review. Its announcement triggered sharp selloffs across the cybersecurity industry. On release day, JFrog—an end-to-end software supply chain solutions provider—dropped nearly 25%. On February 23, 2026—the first full market day following the release—CrowdStrike, Datadog, and Zscaler fell around 11%; Fortinet and Okta fell roughly 6%; and SentinelOne and Palo Alto Networks fell approximately 5% and 3%, respectively. The Global X Cybersecurity ETF reached its lowest level since November 2023. These developments raise questions about whether AI-powered code analysis will disrupt the established cybersecurity ecosystem and underscore the need to demystify what new AI cyber tools can really accomplish—and where they might fall short.  

Product Details 

Q1: How does Claude Code Security function—and how does it differ from traditional static application security testing (SAST)? 

A1: Conventional rule-based static analysis uses pattern matching, comparing code with known vulnerability signatures. This approach effectively detects common issues but often overlooks more complex vulnerabilities. Anthropic presents Claude Code Security as a reasoning-based security analysis capability and characterizes it as superior to traditional SAST techniques. By reasoning over codebase behavior, it attempts to understand component interactions and trace data flows. Anthropic claims that, through this approach, Claude Code Security identifies vulnerabilities that traditional SAST tools miss.  

Claude Code Security runs each finding through a multi-stage verification process to filter out false positives. It assigns severity and confidence ratings to each finding, allowing analysts to prioritize the highest-risk vulnerabilities. Claude Code Security recommends remediations—but does not apply them without human approval.  

Using Claude Code Security with Claude Opus 4.6, Anthropic’s latest large language model (LLM), developers reportedly identified over 500 vulnerabilities in open-source production codebases, which expert reviewers failed to detect for decades. 

Q2: Where does Claude Code Security still struggle? 

A2: Despite its detection capabilities, Claude Code Security has significant structural limitations. These limitations do not negate the tool’s usefulness, but they limit its potential real-world impact.  

Claude Code Security operates at the source-code analysis stage of the software development life cycle (SDLC), evaluating potential vulnerabilities before deployment. Analyzing code at this stage identifies many problems. However, it cannot easily determine whether attackers can exploit a vulnerability in a live environment. Security failures often derive from system configuration, authentication processes, infrastructure dependencies, and user behavior, which source code analysis tools cannot observe.  

Like all LLM systems, Claude Code Security leverages probabilistic inference. This introduces hallucinations and incorrect findings as a persistent reliability challenge. As an LLM-based system, Claude Code Security also operates with limited context windows and incomplete knowledge, which reduces accuracy. Finally, AI systems like Claude Code Security lack deep contextual awareness to fully understand the intended behavior of complex applications.  

AI-driven code analysis also introduces new attack surfaces. Tools like Claude Code Security face vulnerability to prompt injection, memory poisoning, and other forms of adversarial manipulation. Research finds that such attacks on agentic coding assistants succeed frequently, and many existing defenses mitigate less than half of sophisticated attacks. As such, AI-based code reviewers may draw adversarial targeting—particularly when analyzing untrusted code repositories.  

Consequences 

Q3: Why did cybersecurity stocks fall—and did markets overreact? 

A3: AI innovation repeatedly triggers technology stock selloffs, with markets perceiving legacy companies as vulnerable to frontier models’ capabilities. Indeed, Anthropic’s early 2026 release of Claude’s legal plugin triggered such a disruption, with the S&P 500 software and services index falling nearly 4% in one trading day and the sector shedding approximately $830 billion in six trading days. Claude Code Security landed in this broader environment, causing investors to react acutely and erasing tens of billions of dollars in market value. 

Investors’ conflation of build-time code security with the broader cybersecurity sector amplified the scale of the selloff. Markets insufficiently recognized that SAST-style tooling accomplishes a different task than endpoint detection and response (EDR) or extended detection and response (XDR). Where Claude Code Security assesses code before deployment, EDR and XDR defend live software by catching active adversary behavior. Therefore, the fundamental technical impact of Claude Code Security did not justify widespread stock losses across the cybersecurity industry. Markets overreacted to Claude Code Security’s release in “a panic-driven, narrative-led selloff.” Stocks rebounded in the days following the initial selloff, underscoring the excessive nature of initial market reactions.  

However, the fear underlying the rapid sell-off reflects genuine risk perceptions. Further evolutions in AI capabilities may generate more tangible effects on previously unaffected cybersecurity providers.  

Q4: Which tools and workflows does Claude Code Security disrupt—and which remain largely unaffected? 

A4: Because Claude Code Security seemingly improves and democratizes application security efforts, it primarily disrupts build-time code analysis tools and providers of aligned services. Claude Code Security most directly affects SAST and adjacent code-scanning techniques—such as software composition analysis (SCA) and application security posture management (ASPM). Claude Code Security could severely impact the core business of application security companies, including Veracode, Checkmarx, Snyk, and Black Duck Software. Similarly, Claude Code Security likely undercuts manual vulnerability triage workflows—reducing the demand for dedicated triage analysts.  

Because Claude Code Security does not perform active analysis or conduct live countermeasures, it does not directly impact runtime security or operational defense. Platforms that rely on behavioral analytics, threat intelligence, or real-time monitoring remain strategically central—including EDR, XDR, network security platforms, and security operations centers (SOCs). Despite short-term stock impacts, companies like CrowdStrike, Palo Alto Networks, Fortinet, Zscaler, and SentinelOne face no additional exposure. Workflows like incident detection, threat hunting, log analysis, response automation, and incident response continue uninterrupted.  

Additionally, the identity security and cloud security segments of the cybersecurity industry appear insulated from Claude Code Security’s impacts. These segments operate at the environment and access-control layer, where breaches can occur regardless of source-code security. Identity security platforms—which address authentication, authorization, privileged access, and identity governance—remain crucial, which limits exposure for companies like Okta and SailPoint. Cloud security platforms—which focus on cloud configuration, infrastructure vulnerabilities, and compliance monitoring—continue to play a central role, limiting disruption to companies like Wiz and Orca Security.  

Projections 

Q5: How will tools like Claude Code Security impact the offense-defense balance? 

A5: Because tools like Claude Code Security increase the efficiency of vulnerability discovery and remediation, they could strengthen defensive capabilities. However, the same tools present inherently dual-use capabilities, allowing attackers to also more quickly identify and exploit vulnerabilities. Research indicates that AI helps experts find weaknesses faster, and either write patches or develop exploits, depending on their intent. Therefore, improvements in automated vulnerability discovery do not automatically favor defense. Instead, they likely accelerate the tempo of cyber competition, pushing defenders to leverage AI tools to find and mitigate flaws before adversaries use these tools to weaponize them.  

Because AI tools also accelerate software development and deployment, they rapidly expand the attack surface, forcing defenders to monitor and secure larger expanses of code. This likely pushes both attackers and defenders to rely more heavily on automation, further accelerating the tempo of cyber competition. Ultimately, the continuing evolution of tools like Claude Code Security will leave the existing offense-defense balance fundamentally unaffected—producing faster operational cycles without generating a decisive advantage for either side.  

Q6: As tools like Claude Code Security evolve, which cybersecurity tasks demand greater emphasis? 

A6: As AI-driven code analysis tools mature, they will likely automate substantial portions of vulnerability discovery and triage. This will significantly reduce the demand for cybersecurity professionals in those areas. However, rather than limiting the need for cybersecurity professionals more broadly, tools like Claude Code Security will instead shift cybersecurity efforts toward tasks that AI cannot effectively automate.  

Because real-world compromises frequently arise from environment configurations, authentication processes, deployment architecture, and infrastructure dependencies, dynamic testing and exploit validation will likely gain importance. Dynamic application security testing (DAST) vendors, such as Invicti, StackHawk, and Rapid7, will likely grow. 

Modern organizations already operate dozens of security tools simultaneously, requiring constant integration. Multiplying AI tools will exacerbate integration demands. Security orchestration, automation, and response (SOAR) tools, which coordinate tools and align distinct workflows, will become central. Without them, enhanced vulnerability discovery will not lead to improved security.  

AI’s growing embeddedness in development and security processes demands greater security governance and human oversight. Organizations must clearly define approval workflows, audit requirements, and limits on automation. They must also implement formal oversight mechanisms to monitor AI decision quality, prevent overreliance on automated findings, and ensure explainability.  

As automated detection improves, adversary-focused investigation and threat intelligence gain importance. The automation of mundane, repetitive tasks frees analysts to focus on higher-level strategic work. More specifically, these efforts include assessing adversary tactics, techniques, and procedures (TTPs), targeting tendencies, and operational objectives. This will require defenders to develop a deeper understanding of threat landscapes to improve contextual judgment.  

Lastly, AI tools introduce new attack surfaces, emphasizing the importance of novel security practices like prompt injection defense, model access controls, data leakage prevention, and secure model deployment. Defenders must develop greater expertise in model assessment to detect failures, compromises, or other anomalies. With greater deployment of AI-enabled capabilities, defenders must prioritize protecting AI systems.  

Conclusion 

Ultimately, Claude Code Security does not signal the collapse of the cybersecurity industry, but it does mark a structural shift. As AI-driven code analysis accelerates vulnerability discovery without decisively favoring offense or defense, competitive advantage will flow to organizations that prioritize new cybersecurity tasks and adapt to an increased tempo of cyber competition. 

Peter Dohr

Research Intern, Strategic Technologies Program