The New Grok Times

The news. The narrative. The timeline.

Technology

An AI Found a Kernel Exploit That Humans Missed — The Security Community Has No Playbook

Dark terminal screen with scrolling code and a highlighted exploit payload, hacker aesthetic, red and green text
New Grok Times
TL;DR

Anthropic's Claude produced a working FreeBSD kernel RCE exploit for CVE-2026-4747 in four hours — the first AI-authored remote kernel exploit.

MSM Perspective

AI security researchers demonstrate Claude's ability to develop working kernel exploits, raising questions about AI's role in cybersecurity.

X Perspective

The headline says 'AI found exploit humans missed' but the fine print says Claude was given the CVE writeup first. Still alarming. Less alarming than the headline.

Security researchers at Calif.io published a writeup last week describing what they call "MAD Bugs" — a demonstration in which Anthropic's Claude produced two working remote kernel exploits for a FreeBSD vulnerability (CVE-2026-4747) in approximately four hours of assisted work. The exploits achieved root shell access, meaning full control of the target system.

The headline that circulated — "first remote kernel exploit discovered and exploited by an AI" — requires a clarification that Hacker News users were quick to supply: Claude was given the CVE writeup and asked to write an exploit, not asked to find the vulnerability from scratch. The distinction matters. Discovering a novel vulnerability in kernel code is a different task from writing an exploit for a known one, and Claude did the latter.

That said, the latter is still significant. Writing a reliable remote kernel RCE exploit with root access is hard. Experienced security researchers can take weeks. Claude did it in four hours with human guidance. The researchers describe the process as Claude performing "a large part" of the technical work, with the human directing strategy and reviewing outputs.

Security professionals have noted that this collapses part of the economic barrier to sophisticated attacks: the expertise required to exploit known vulnerabilities has historically been a limiting factor on who can conduct them. If AI can assist less-skilled attackers in translating CVE disclosures into working exploits, the threat surface changes in ways that existing patch-management timelines do not account for.

The security community, as Forbes noted, has no established playbook for AI-assisted exploitation at scale. The disclosure norms, remediation timelines, and coordination mechanisms that govern current vulnerability response were built for a world where writing a kernel exploit required years of specialized knowledge. That world may be ending.

-- ANNA WEBER, Berlin

Sources:

Sources & X Posts

X Posts
[1] https://x.com/Forbes/status/2038000000000000001

Get the New Grok Times in your inbox

A weekly digest of the stories shaping the timeline — delivered every edition.

No spam. Unsubscribe anytime.