
Anthropic opened Claude Security to all Enterprise customers on April 30, 2026. No API integration. No custom agent setup. You connect a repo, hit scan, and get findings. During the closed preview — which ran from February through April with hundreds of organizations — the tool found over 500 vulnerabilities in production codebases that had survived years of expert review. That is a real claim, and it is worth understanding what is behind it.
This Is a Product, Not a Feature
Claude Security lives at claude.ai/security, sits in the Claude.ai sidebar, and requires zero configuration beyond your existing Enterprise subscription. No API key juggling. No prompt engineering. No agent scaffolding.
That is a meaningful signal about where Anthropic is headed. They are not just selling model API access anymore. Claude Security puts them directly in the DevSecOps tooling market alongside Snyk, Semgrep, and GitHub Advanced Security. This is Anthropic competing on product, not just model benchmarks.
What It Actually Finds — and How
The core difference between Claude Security and existing SAST tools is how they analyze code. Snyk and Semgrep are pattern matchers: they compare your code against databases of known vulnerability signatures. They find what they know to look for.
Claude Security traces data flows across your entire codebase. It reads how components interact across files and modules, follows how data moves through your application, and reasons about context the way a human security researcher would. That is how it catches bugs that rule-based tools miss — specifically, complex logic errors that span multiple functions and files, and context-dependent vulnerabilities that do not match any known pattern.
The four vulnerability categories it focuses on:
- Memory corruption — particularly in C and C++ codebases
- Injection flaws — SQL injection, command injection, template injection
- Authentication and authorization bypass — logic flaws in auth flows that do not look wrong in isolation
- Complex logic errors — multi-function, multi-file bugs that require understanding the whole picture
During the private preview, the tool found bugs in open-source projects that had been live for years — some reportedly for decades — despite sustained expert review. That is either a genuine capability advantage or very favorable demo selection. The public beta will tell us which.
The Self-Validation Step Matters
LLM-based scanners have a credibility problem: they hallucinate findings. Anthropic knows this. Before Claude Security surfaces a result, it runs a second validation pass to challenge its own conclusions. The idea is to cut false positives before they reach your security team.
Whether this works at scale in production is the real question. The private preview was run by Anthropic — not independent researchers. The false-positive rate from real enterprise workloads has not been published yet. If a scanner flags 50 issues and 30 are noise, security teams stop trusting it within a sprint. That is the bar Claude Security needs to clear to be useful rather than just impressive.
The Workflow Integration Is Real
Claude Security is not a demo. The enterprise workflow features are solid:
- Scheduled scans — automated scanning on your preferred cadence
- Targeted directory scans — scan just the payments module, not the entire monorepo
- Slack and Jira webhooks — route findings directly into your existing ticketing and alerting pipeline
- CSV and Markdown export — bring findings into existing audit tools without a migration
- Dismissal with comments — mark false positives with documented reasons for audit trails
Each finding includes a confidence rating, severity level, likely impact, reproduction steps, and patch instructions. You can apply those patches directly in Claude Code context without switching tools.
Where It Fits With Snyk and Semgrep
Snyk response to the Claude Security launch was a blog post titled “Why Anthropic Launching Claude Code Security Is Great News for the Industry.” That is either gracious positioning or honest assessment — probably both. The reason: Claude Security and Snyk are not competing for the same detection category.
Snyk specializes in dependency CVEs and container scanning — known vulnerabilities in open-source packages. Claude Security does not do Software Composition Analysis (SCA) at all. Snyk is actually embedding Anthropic Claude models for remediation suggestions. These tools are converging on the same workflows, not fighting over territory.
Semgrep excels at enforcing coding standards and catching known bad patterns fast. Claude Security goes deeper on custom business logic. Mature security teams will run all three — it is not an either/or decision.
Who Gets Access Now
Claude Security is available now to all Claude Enterprise customers. Team Premium users ($100/seat/month) are listed as “coming soon” — no date confirmed. Individual Max plan users are further behind the queue.
The Enterprise-first rollout makes sense for a beta product in a market where false positives can poison adoption. Getting credibility with large organizations before opening to self-serve teams is the right sequencing. Whether “coming soon” means months or quarters will matter for smaller engineering teams already deep in Claude Code daily workflows. You can sign up for access or check current availability on the Anthropic Claude Security page.













