Anthropic’s new Claude Security tool scans your codebase for flaws – and helps you decide what to fix first


Claude Security

Elyse Betters Picaro / ZDNET

Follow ZDNET: Add us as a preferred source on Google.


ZDNET’s key takeaways

  • AI vulnerability scanning is moving into developer workflows.
  • Claude Security turns findings into prioritized fix guidance.
  • The big challenge is keeping these tools from attackers.

Anthropic has announced Claude Security, a new defensive cybersecurity product. Right now, it’s available in public beta to Enterprise-tier Claude users, with availability “coming soon” to Claude Team and Max-tier users.

Also: Apple, Google, and Microsoft join Anthropic’s Project Glasswing to defend world’s most critical software

Claude Security is another tool in Anthropic’s cyberdefense toolbox. It gives security teams a way to “scan codebases for vulnerabilities and generate targeted patches” using the Claude Opus 4.7 model.

Earlier in the month, Anthropic debuted Project Glasswing, an AI Manhattan Project aimed at finding vulnerabilities in the world’s infrastructure of open-source software.

Glasswing uses an Anthropic model called Mythos, a model deemed so dangerous that it’s not being released to the public. It’s being shared with Glasswing participants, including erstwhile competitors like Amazon Web Services, Anthropic, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorgan Chase, the Linux Foundation, Microsoft, Nvidia, and Palo Alto Networks.

Vulnerability scanning

At the core of both Project Glasswing and Claude Security is vulnerability scanning. Most cyberattacks begin with an enemy actor exploiting a vulnerability. So, if defenders can find and patch the vulnerabilities, the malicious perpetrator has a smaller attack surface.

Remember Star Wars? The entire plot of A New Hope revolves around Death Star plans that Princess Leia stores in R2-D2. Once the Rebels get those plans, they’re able to find a vulnerability. All Luke and the other pilots have to do is fire one torpedo down an exhaust port on the Death Star, and… boom!

That, boys and girls, is a vulnerability. The Death Star had one fatal flaw. Your codebase probably has more. Anthropic’s new Claude Security tool wants to find them before attackers get there first.

Back in the real world, everything runs on software, which is inherently vulnerable. Not only do vulnerabilities open doors for adversaries to exploit, but they also could cause damage simply by existing and causing bugs experienced by users of the software.

Also: I teamed up two AI tools to solve a major bug – but they couldn’t do it without me

I first used AI to do vulnerability scanning back in September with OpenAI’s Codex. At the time, it failed because it couldn’t handle a project-wide context. But when I teamed the AI pair programming tool with ChatGPT’s Deep Research, which was better with lots of data, the two found a number of critical vulnerabilities in my security software, which I immediately fixed.

Since then, both Codex and Claude Code have got better in terms of how much code they can process in one context, but neither is capable of handling an entire large codebase at once.

Mythos can, however. It can even handle the relationships between codebases on a macro scale. But it’s not available to the public, even via Enterprise-tier fees. Last month, OpenAI introduced Codex Security, which also offers a larger-scope context analysis. And now Claude Security can do similar larger-scale scans.

This new product is capable of scanning a full repository or a targeted directory. According to Anthropic, “Claude reasons about code the way a security researcher does, tracing data flows, reading source code, and working out how components interact across files and modules.”

There’s more to Claude Security, but first let’s talk about the big vulnerability introduced by vulnerability-scanning AIs.

Weapons of digital destruction

Vulnerability scanners help defenders defend. But they also help attackers find where to attack. That was the whole point with the Rebels’ attack on the Death Star. Once they knew of a vulnerability, they could exploit it.

For example, both Microsoft and OpenAI have reported that state-affiliated actors from China, Iran, Russia, and North Korea have used large language models to research various companies and cybersecurity tools, debug code, generate scripts, and create content likely for use in phishing and spear-phishing campaigns.

Also: AI is getting scary good at finding hidden software bugs – even in decades-old code

Anthropic is trying to prevent its models from being used in similar ways. As of the launch of Opus 4.7, the company includes new cyber safeguards that automatically detect and block requests suggestive of prohibited or high-risk cybersecurity uses.

For example, Opus 4.7 now blocks “Activities that are almost always used maliciously and have little to no legitimate defensive application such as mass data exfiltration or ransomware code development.”

On the other hand, what about activities that have legitimate defensive applications, such as vulnerability exploitation or offensive security tooling development? Opus 4.7 also blocks these activities, but cybersecurity researchers who are approved to join Anthropic’s Cyber Verification Program gain access to AI capabilities in this restricted gray zone.

Also: This new Claude Code Review tool uses AI agents to check your pull requests for bugs – here’s how

Effectively, those able to obtain a security clearance from Anthropic can use Opus 4.7 to perform blocked security activities in the course of doing their job. Disclosure: I am an authorized member of Anthropic’s Cyber Verification Program, so I have access to these capabilities as part of my cyberwarfare, cyberdefense, and counterterrorism work.

Making vulnerabilities actionable

The problem with vulnerability scanning is that it can become a firehose of noise. Every little thing can be flagged, and you can spend hours or days chasing down a bug that is of fairly little consequence instead of repairing a vulnerability that can cause an extinction-level event.

Claude Security is introducing a “multi-stage validation pipeline independently verifies each finding before it reaches an analyst, and every result gets a confidence rating.”

The AI is able to explain each “finding” in detail, including factors like confidence, severity, likely impact, reproduction steps, and recommended fix. This can be enormously helpful, because developers can then prioritize working on those high-confidence, large-impact, severely troubling problems first, without having to waste time on lesser issues.

Also: Why AI is both a curse and a blessing to open-source software – according to developers

From these findings, Claude Security gives defenders the ability to open the code in Claude Code, in context, so they can see and modify the areas needing work right from the finding results.

Anthropic has also added a series of workflow optimizations. It says, “We’ve added scheduled scans for ongoing coverage, the ability to dismiss findings with documented reasons (so future reviewers can trust prior triage decisions), and CSV and Markdown export for integrating findings into existing tracking and audit systems.”

Stay safe out there

Claude Security subscribers can work with technology and security partners. Anthropic specifically pointed out technology partners including CrowdStrike, Palo Alto Networks, SentinelOne, Trend.ai, and Wiz, which are integrating Opus 4.7 into their cybersecurity platforms.

Also: Google bets $32B on AI agent cyber force as security arms race escalates

The company is also working with security partners including Accenture, BCG, Deloitte, Infosys, and PwC, which are deploying Claude Security to help enterprises strengthen their security posture.

Do you see AI vulnerability scanning as more useful for finding dangerous flaws or for helping developers prioritize fixes faster? Let us know in the comments below.


You can follow my day-to-day project updates on social media. Be sure to subscribe to my weekly update newsletter, and follow me on Twitter/X at @DavidGewirtz, on Facebook at Facebook.com/DavidGewirtz, on Instagram at Instagram.com/DavidGewirtz, on Bluesky at @DavidGewirtz.com, and on YouTube at YouTube.com/DavidGewirtzTV.





Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


India’s financial sector is at a turning point. Gross NPAs of Scheduled Commercial Banks have fallen to a historic low of 2.15% as of September 2025, a figure not seen since 2010–11. Yet in absolute terms, gross NPAs still stand at approximately ₹4.32 lakh crore. The scale of the problem hasn’t disappeared; it’s shifted, from large corporate defaults to a more distributed mass of retail and MSME accounts scattered across geographies, legal jurisdictions, and ticket sizes.

For banks, NBFCs, and fintechs trying to recover these dues, understanding India’s debt recovery laws is not optional, it is foundational. This guide breaks down every major legal channel available, how they perform in practice, and what 2025’s regulatory shifts mean for lenders and recovery professionals.

At a Glance: India’s debt collection software market reached approximately $172.8 million in 2024 and is projected to reach $456 million by 2033 (CAGR of 10.48%, IMARC Group). Over 320 new debt recovery platforms launched between 2022 and 2024. The race is on, but legal infrastructure remains the backbone.

What Is Debt Recovery?

Debt recovery is the structured process by which lenders reclaim unpaid loan amounts from borrowers who have defaulted. Credit creation, through loans extended to individuals, MSMEs, and corporations, is essential to economic growth. But when borrowers default, lenders must navigate a complex web of legal mechanisms to recover what is owed. In India, this ecosystem spans eight distinct legal frameworks, multiple tribunals, and an increasingly digitised regulatory environment.

A loan account is classified as a Non-Performing Asset (NPA) when both principal and interest payments remain overdue for 90 days. Once classified as an NPA, lenders have access to several legal channels to recover dues, each with its own jurisdiction, timelines, and effectiveness.

Two Paths: Legal vs. Illegal Methods

The law draws a clear line between legitimate recovery and harassment. RBI guidelines require that all recovery communications occur strictly between 8 AM and 7 PM, agents carry valid identification, and no abusive or intimidatory tactics are used. The RBI’s February 2026 draft directions for both commercial banks and AIFIs (All India Financial Institutions) now mandate board-approved recovery policies, IIBF certification for agents, recording of recovery calls, and public disclosure of empanelled recovery agents, all effective July 1, 2026.

Illegal methods, public shaming, threats, late-night calls, or unauthorised property seizure, are not only unethical but expose lenders to regulatory action and grievances filed with the RBI Ombudsman. Nearly 39% of borrowers surveyed have reported abusive recovery calls; RBI data confirms that loan and credit-card complaints now form the largest single category of grievances received.

1. Indian Contract Act, 1872

Every loan relationship originates from a contract. If a borrower defaults, the lender can seek legal relief under several provisions of the Indian Contract Act, through a Contract of Guarantee (Section 126), Contract of Indemnity (Section 124), or by establishing Fraud (Section 17) or Misrepresentation (Section 18). This is typically a foundational step before more specific recovery mechanisms are invoked.

2. Civil Remedy (CPC Order IV)

A civil suit under Order IV of the Civil Procedure Code allows lenders to approach a court for money recovery. The suit must be filed within 3 years from the date of the cause of action and in the court that has jurisdiction over the borrower’s residence or place of business. Court fees are levied based on the claim amount. Civil suits are best suited for cases where other faster mechanisms are not available — but they are time-consuming and should be approached with a structured documentation trail.

3. Criminal Case Under IPC (Now BNS, 2023)

Where the default involves elements of cheating, criminal breach of trust, or dishonest misappropriation, lenders can file a criminal case. Key provisions include Cheating (Sections 415/417 IPC, now mirrored in the Bharatiya Nyaya Sanhita, 2023), Criminal Breach of Trust (Sections 405/406), and Dishonest Misappropriation of Property (Section 403). Some of these offences are non-bailable and cognizable, meaning the defaulter faces serious legal consequences.

4. Insolvency and Bankruptcy Code (IBC), 2016

The IBC remains India’s most powerful corporate debt recovery instrument. Where the defaulted amount exceeds ₹1 crore (revised from ₹1 lakh in 2020), creditors can approach the NCLT for initiating the Corporate Insolvency Resolution Process (CIRP). A Committee of Creditors (CoC) is formed, an Insolvency Professional appointed, and the resolution must be approved by 66% of CoC votes within 330 days.

IBC Impact by the Numbers (as of March 2025):
— Over 30,000 applications involving defaults of ₹13.78 lakh crore were settled at the pre-admission stage alone, demonstrating IBC’s deterrence effect.
— Average recovery rates improved from 15–20% pre-IBC to approximately 30% post-IBC (S&P Global Ratings, December 2025).
— S&P upgraded India’s insolvency regime from ‘Group C’ to ‘Group B’ in December 2025.
— However, actual average CIRP duration stands at 713 days, more than double the statutory 330-day limit. NCLT pendency is nearly 30,600 cases (March 2025), with an estimated 10-year clearance time at current rates.

IBC’s biggest strength is its behavioural impact, it has fundamentally shifted the culture from “debtor in possession” to “creditor in control.” The proportion of overdue corporate loan amounts relative to total outstanding fell from 18% in 2018 to 9% in 2024 (IIM Bangalore study).

5. Negotiable Instruments Act, Section 138 (Cheque Bounce)

One of the most frequently invoked debt recovery provisions in India, Section 138 of the NI Act applies when a post-dated or security cheque issued by a borrower is returned unpaid. Upon dishonour, the payee must send a demand notice within 30 days; if the borrower fails to make payment within 15 days, criminal proceedings can be initiated. The defaulter may face imprisonment of up to 2 years, a fine twice the cheque amount, or both. Cheque bounce cases number in the millions annually across Indian courts, making efficient case management critical for lenders handling high volumes.

6. RDDBFI Act, 1993, Debt Recovery Tribunals (DRTs)

The Recovery of Debts Due to Banks and Financial Institutions Act established a network of 39 Debt Recovery Tribunals (DRTs) and 5 Debt Recovery Appellate Tribunals (DRATs) across India. Banks and NBFCs can file applications under Section 19 for recovery of dues. Borrowers who wish to appeal a DRT order must deposit 50% of the debt amount (reducible to 25% by the appellate tribunal). While DRTs were designed for speed, chronic understaffing and high pendency have limited their effectiveness. DRTs accounted for just 4.2–4.9% of total NPA recovery in recent years, among the lowest of all channels.

Note on DRT Reform: The government has signalled intent to expand DRT jurisdiction and address vacancies. The BAANKNET e-auction portal, launched March 25, 2025, is already improving asset disposal efficiency for PSBs and IBBI-referred cases.

7. SARFAESI Act, 2002

The Securitisation and Reconstruction of Financial Assets and Enforcement of Security Interest Act allows secured creditors, banks, NBFCs, and ARCs, to take possession of and sell secured assets without court intervention. Once a loan is classified as NPA under Section 13, a notice is sent to the defaulter giving 60 days to repay. If repayment doesn’t happen, the lender can sell the asset or assign it to an Asset Reconstruction Company (ARC) at a discounted rate.

SARFAESI is particularly favoured by banks due to lender control over the asset sale process. It accounted for 17.4–26.7% of total NPA recovery in recent reported years. Recent amendments have strengthened the framework further, including empowering RBI to audit ARCs and mandating CERSAI registration of security interests.

8. Summary Suit

A Summary Suit (Order XXXVII, CPC) is a fast-track civil proceeding suited for liquid debts not exceeding ₹10 lakh. The defaulter has just 10 days from the date of service to appear before the court. If they fail to do so, the court may pass an ex-parte decree immediately. While the ticket-size cap limits its use for large institutional lending, it is a practical tool for smaller NBFC or retail exposures.

How Each Channel Actually Performs: Recovery Rate Comparison

Recovery Channel Share of Recovery (Recent Years) Average Timeline Best Suited For
IBC / NCLT ~44–46% (highest among all channels) 713 days average (statutory: 330 days) Large corporate defaults >₹1 crore
SARFAESI Act 17–27% Months (no court required) Secured assets, banks & larger NBFCs
DRTs 4.2–4.9% 1–3+ years (due to pendency) Mid-size bank/FI claims
Lok Adalats ~6% (low recovery per case) Weeks to months Small-ticket pre-NPA settlements
Section 138 / NI Act Varies (high volume, lower value) 1–3 years in metro courts Cheque-secured loans
Civil Suits Varies 3–7 years Unsecured creditors, contractual disputes

Sources: RBI Annual Reports, IBBI data, Lexology analysis, IBC Laws research platform, FACTLY data analysis (March 2025).

RBI’s 2025–26 Guidelines: What’s Changing for Lenders

The regulatory landscape for debt recovery shifted significantly in 2025. Three key developments stand out:

1. RBI Digital Lending Directions, 2025 (effective May 8, 2025) — This consolidated framework governs all digital lending activity including recovery. Lenders must notify borrowers via email/SMS before any recovery agent makes contact, ensure all disbursals go directly to borrower bank accounts, and maintain transparent grievance channels. Lending Service Providers (LSPs) acting as recovery agents are now held to the same standards as the Regulated Entity (RE) itself.

2. Draft Responsible Business Conduct (Amendment) Directions, February 2026 — Released simultaneously for commercial banks and AIFIs, these draft directions (effective July 1, 2026) represent the most comprehensive overhaul of recovery conduct standards in years. Key mandates include: board-approved recovery policy, IIBF certification for all recovery agents, mandatory recording of recovery calls, public disclosure of empanelled agents, written notice of default before any recovery action, and strict prohibition on harsh practices including public shaming, abusive language, and family/colleague harassment.

3. BAANKNET Portal, March 2025 — The government’s revamped e-auction platform integrates all 12 Public Sector Banks and IBBI with automated KYC, secure payments, and bank-verified property titles, significantly improving transparency in SARFAESI-based asset sales.

Compliance Implication for Lenders: Legal recovery today is increasingly about process documentation, not just legal filing. A timestamped, digitally-traceable record of every notice, communication, and action is no longer just operationally helpful — it is a regulatory requirement. A WhatsApp chat archive will not hold up under RBI or DRT scrutiny.

Best Practices for Lenders Navigating the Legal System

Build a Structured Internal Process Before Filing

Debt recovery requires coordination across internal legal, finance, and collections teams — and often, an external advocate or law firm. Designate clear accountability: who signs the notice, who coordinates with external counsel, who monitors hearing dates. Manual calendar-based tracking of court dates leads to adjournments, value erosion, and missed opportunities. Automated case management — with alerts triggered by hearing schedules, advocate assignments, and SLA breaches — is the baseline for any serious recovery operation today.

Document Everything, Digitally

Every communication with the borrower — from the first demand notice to field visit reports — must be documented with timestamps. This is not just good practice; it directly affects your legal standing. In SARFAESI and DRT proceedings, the quality and completeness of the paper trail often determines outcomes. Automated notice dispatch that generates a delivery-confirmed, timestamped audit log gives lenders a defensible record.

Choose the Right Jurisdiction Before Filing

Filing in the wrong court or tribunal is a costly, time-consuming error. Match the legal channel to the debt type and ticket size: IBC/NCLT for large corporates (>₹1 crore), SARFAESI for secured assets, DRT for bank/FI claims, Section 138 for cheque bounce, civil suits or Lok Adalats for smaller unsecured accounts. For retail and MSME NPA accounts with smaller ticket sizes, pre-litigation ODR (Online Dispute Resolution) platforms are emerging as a cost-effective alternative to formal proceedings.

Engage Qualified Counsel, and Track Their Performance

Advocate selection in recovery litigation is frequently based on familiarity rather than performance data. This leads to systemic underperformance. High-performing lenders are increasingly using data to track advocate win rates, adjournment frequency, and case resolution timelines by jurisdiction, and adjusting their panels accordingly.

Maintain Ethical Standards to Protect Your Recovery

Courts and tribunals look at the conduct of both parties. A lender that can demonstrate ethical, documented, and RBI-compliant recovery behaviour before filing is better positioned to receive favourable outcomes. Violations of RBI conduct guidelines, even if not the direct subject of the case, can undermine a lender’s standing.

The Role of Technology in Modern Debt Recovery

The 2024–25 period has seen a structural shift in how lenders approach recovery infrastructure. AI is now deployed across predictive default scoring, omnichannel borrower communication, automated legal notice dispatch, and court case management. Mid-sized banks have reported a 34–36% reduction in collection costs after AI adoption, with recovery rate improvements of 10–25%.

The most significant strategic shift is toward ecosystem thinking rather than monolithic platform adoption. Different parts of the recovery journey require different tools: pre-litigation communication platforms for early-stage accounts, ODR/mediation for small-ticket disputes, and dedicated legal operations infrastructure for NPA accounts heading to DRT, SARFAESI, or NCLT. The bridge between collections-stage activity and legal-stage activity, where cases are handed off, documents compiled, and notices issued, remains the most operationally fragile point in most lenders’ recovery chains.

Key Technology Stats for Recovery Professionals:
— AI adoption in mid-size banks: 34–36% cost reduction in collections
— Recovery rate improvement post-AI: 10–25%
— India’s debt collection software market CAGR: 10.48% (2024–2033)
— PSB gross NPA ratio: 2.50% (September 2025)
— Private sector bank NPA ratio: 1.73% (September 2025)

The Bottom Line

India’s debt recovery legal framework is comprehensive, and under active improvement. The IBC has reshaped creditor rights. SARFAESI gives secured lenders direct enforcement power. The 2025–26 RBI guidelines are tightening conduct standards while pushing for digital accountability. And the absolute scale of NPAs, despite improving ratios, means the demand for effective, tech-enabled, legally defensible recovery will only grow.

For lenders, the question is no longer whether to digitise their legal recovery operations, but how quickly they can build infrastructure that is compliant, data-driven, and defensible at every stage, from first notice to final court order.


Want to see how Legodesk connects your collections workflow directly to legal recovery, from automated notice dispatch to court case management, notice tracking, and recovery through Lok adalat? Request a demo



Source link