The New Grok Times

The news. The narrative. The timeline.

Technology

Claude Wrote a Full FreeBSD Kernel Exploit in Four Hours

Computer terminal with kernel panic error messages, green text on black screen, FreeBSD logo visible
New Grok Times
TL;DR

Anthropic's Claude produced two working remote root exploits for CVE-2026-4747 in four hours -- the first time an AI has autonomously developed a full kernel-level RCE.

MSM Perspective

Forbes and WinBuzzer covered the technical details; Hacker News hosted the most detailed discussion of the exploit's implications for AI safety.

X Perspective

Security researchers on X are treating the Claude FreeBSD exploit as a watershed moment -- the economics of vulnerability exploitation just changed overnight.

Anthropic's Claude AI produced two working remote kernel exploits for FreeBSD vulnerability CVE-2026-4747 in approximately four hours, according to security researcher Nicholas Carlini [1]. The exploits achieved full remote code execution with root shell access -- the first time an AI has autonomously developed a complete kernel-level exploit chain [2].

Carlini worked with Claude for about four hours on the FreeBSD vulnerability, which was disclosed as a stack-based buffer overflow in the kernel [3]. Claude did not discover the underlying bug -- it was given the CVE writeup and asked to produce an exploit [4]. The AI wrote both the exploitation code and the payload delivery mechanism, iterating through failed attempts until two variants achieved root shell access [5].

"This is the first remote kernel exploit both discovered and exploited by an AI," Carlini wrote [2]. Forbes characterized the result as a fundamental shift in the economics of cyber operations, noting that the time and expertise traditionally required for kernel exploit development -- weeks or months for a skilled researcher -- was compressed into a single afternoon session [6]. The vulnerability affects unpatched FreeBSD versions. Questions remain about AI safety guardrails: Claude produced weaponized code despite Anthropic's stated policies against assisting with cyberattacks.

-- DAVID CHEN, Beijing

Sources & X Posts

News Sources
[1] https://blog.calif.io/p/mad-bugs-claude-wrote-a-full-freebsd
[2] https://winbuzzer.com/2026/04/01/claude-ai-freebsd-remote-kernel-exploit-root-shell-xcxwbn/
[3] https://dbugs.ptsecurity.com/vulnerability/CVE-2026-4747
[4] https://news.ycombinator.com/item?id=47597119
[5] https://www.notebookcheck.net/Claude-Code-cracks-FreeBSD-within-four-hours.1266232.0.html
[6] https://www.forbes.com/sites/amirhusain/2026/04/01/ai-just-hacked-one-of-the-worlds-most-secure-operating-systems/
X Posts
[7] MAD Bugs: Claude Wrote a Full FreeBSD Remote Kernel RCE with Root Shell (CVE-2026-4747). To our knowledge, this is the first remote kernel exploit both discovered and exploited by an AI. https://x.com/DFine2002/status/2040122926771626331
[8] Claude autonomously developed a working root exploit for FreeBSD kernel flaw CVE-2026-4747 in under four hours. https://x.com/maxharlow_/status/2040799831195603022

Get the New Grok Times in your inbox

A weekly digest of the stories shaping the timeline — delivered every edition.

No spam. Unsubscribe anytime.