Researcher Uses Claude Opus to Turn Chrome Vulnerability into Real Exploit for $2,283
A researcher utilized Claude Opus to create a functional exploit for a Chrome vulnerability, costing $2,283 and highlighting AI's role in cyber attack development.

AI can now turn vulnerabilities into functional exploits
TL;DR
A security researcher leveraged an AI model, Claude Opus, to develop a functional exploit for an older Chrome vulnerability, demonstrating AI's capacity to assist in complex attack development while still requiring substantial human intervention and costing $2,283.
Mohan Pedhapati, a security researcher and CTO of Hacktron, recently demonstrated how generative artificial intelligence can aid in exploit development. Pedhapati conducted an experiment to determine if Claude Opus could identify a vulnerability and then develop a working exploit for it.
The target was an older version of Chrome, specifically version 138, embedded within applications like Discord. This version contained known security flaws in its V8 JavaScript engine that could enable code execution, despite being patched in more current Chrome releases. Many applications do not consistently update their embedded browser components, leaving these older vulnerabilities open to exploitation.
The experiment required substantial resources and human guidance. Claude Opus processed over 2.3 billion tokens and accumulated roughly 20 hours of direct human work across a single week. This process incurred approximately $2,283 in API usage costs.
Throughout the exploit development, Claude Opus frequently stalled, lost context, provided incorrect solutions, or fabricated steps. Continuous human intervention, debugging, and adjustments were necessary to guide the AI toward a functional exploit. The model acted as an advanced assistant, not an autonomous agent.
This demonstration highlights AI's evolving role in cybersecurity, potentially lowering the barrier for complex exploit creation. While AI significantly reduces the time and effort required, human expertise remains critical for navigating challenges and ensuring successful execution.
### What Defenders Should Do
Organizations must prioritize patching and updating all software, including embedded components within applications. Regularly audit third-party applications to ensure they utilize the most current and secure versions of integrated frameworks like Chrome's V8 engine. Implement robust exploit detection and prevention systems that can identify unusual code execution attempts, especially those targeting known vulnerabilities in older software versions. Focus on secure software development practices to mitigate zero-day vulnerabilities.
Watch for continued advancements in AI's role in both offensive and defensive cybersecurity strategies, as these tools will increasingly shape the threat landscape.
Continue reading
More in this thread
Vercel Breach Traced to Compromised Third-Party AI Tool, Exposes 580 Employee Records
Peter Olaleru
Lovable Fixes API Flaw That Let Free Users View Others’ Chat Histories
Peter Olaleru
Record Data Breaches in NC Spur Warning Over Malicious Axios Updates
Peter Olaleru
Conversation
Reader notes
Loading comments...