On April 7, Anthropic announced Claude Mythos Preview, an AI model it claims is so effective at autonomously discovering and exploiting software vulnerabilities that the company decided it was too dangerous to release to the public. Access has been restricted to roughly 50 organizations, including Microsoft, Apple, AWS, and CrowdStrike, through a defensive consortium called Project Glasswing.
This isn’t science fiction, and it isn’t just marketing hype. Independent researchers have validated that AI-driven vulnerability discovery is advancing rapidly. For organizations that rely on periodic security assessments and structured patch cycles, understanding how this shift affects your risk profile starts now.
What Claude Mythos Can Actually Do
The numbers are striking. During pre-launch testing, Mythos identified thousands of zero-day vulnerabilities across every major operating system and web browser. Among the publicly disclosed findings:
- A 27-year-old bug in OpenBSD’s TCP SACK implementation, present since 1998 and missed by decades of code review, enabling remote crash of any OpenBSD host over TCP. Anthropic reports the entire discovery campaign cost under $50 for the successful run.
- A 16-year-old flaw in FFmpeg’s H.264 codec that had been hit five million times by automated fuzzers without detection.
- When tested against Firefox 147 JavaScript engine vulnerabilities, Anthropic’s previous flagship model produced working exploits twice out of several hundred attempts. Mythos produced 181 working exploits.
- CVE-2026-4747, a 17-year-old remote root vulnerability in FreeBSD’s NFS implementation, is the first confirmed CVE directly attributed to Glasswing-assisted discovery.
The UK’s AI Safety Institute independently evaluated Mythos and confirmed it solves 73% of expert-level capture-the-flag challenges. No model before April 2025 solved any. AISI estimates frontier AI cyber capability is now doubling roughly every four months.
Context Matters: Separating Capability from Hype
Before the panic sets in, context matters.
Anthropic’s most dramatic claims carry asterisks that most headlines strip away. The “thousands” of critical findings extrapolate from a 198-report human validation sample with 89% severity agreement. That’s impressive, but incomplete. The Firefox exploitation numbers were achieved against a content-process harness without the browser’s sandbox or other defense-in-depth. And security researcher Bruce Schneier has noted that without knowing Mythos’s false positive rate, it’s impossible to tell whether these showcased results are representative or cherry-picked.
A security startup called Aisle demonstrated that smaller, publicly available AI models can already reproduce much of the vulnerability detection work once the code is scoped. Their conclusion: detection is commoditizing faster than exploitation. Finding bugs and weaponizing bugs remain different tiers of capability, for now.
The honest assessment: Mythos is a real capability step, but it’s an accelerant, not a revolution. The trajectory matters more than the single model. Mythos is restricted today, but similar AI capabilities are expected to become freely available through open-source projects within 12 to 18 months. When that happens, the same class of tooling that Anthropic deemed too dangerous to release will be accessible to anyone, including threat actors.
The Glasswing Gap: Why Your Software Probably Isn’t Covered
This is where the conversation shifts from industry news to something that directly affects mid-market and enterprise organizations that build, run, or depend on their own software and systems.
Project Glasswing’s roughly 50 member organizations are overwhelmingly the vendors of widely used open-source and commercial software, the systems that Mythos was trained on and performs best against. That’s sensible: let the biggest vendors patch first.
But as Schneier wrote in The Globe and Mail, the inverse is also true. Software outside the training distribution, including industrial control systems, medical device firmware, bespoke financial infrastructure, and older embedded systems, is exactly where Mythos is least likely to help defenders. A motivated attacker with domain expertise could still use AI as a force multiplier against these systems. As Schneier and co-author David Lie, a professor of computer science at the University of Toronto, wrote: ‘The danger is not that Mythos fails in those domains; it is that Mythos may succeed for whoever brings the expertise.
For nGuard’s customers, this is the critical takeaway. Project Glasswing covers roughly 50 of the world’s largest software vendors and open-source foundations. If your organization develops, customizes, or depends on any application or system built outside of that circle, Mythos doesn’t change your need for application testing, penetration testing, and ongoing vulnerability management. If anything, it reinforces it. The same AI capabilities being used to find decades-old bugs in major platforms will eventually be available to threat actors probing your environment. The question is whether you’ve found your vulnerabilities before they do.
What Organizations Should Do Now
- Compress Your Patch Cadence: Mandiant’s M-Trends 2026 report finds median time-to-exploit has hit negative seven days, meaning exploitation now routinely precedes patch availability. Thirty-day patch SLAs were designed for a different threat landscape. Evaluate whether your vulnerability management program can absorb the pace that AI-accelerated discovery will impose.
- Increase Your Penetration Testing Frequency: Annual penetration testing was designed for a threat landscape where vulnerability discovery moved at a human pace. As AI accelerates that timeline, organizations should evaluate whether their current testing cadence still matches their risk profile. For environments with high exposure, such as internet-facing applications, remote access infrastructure, and systems handling regulated data, more frequent testing and ongoing vulnerability management work together to close the gap between discovery and remediation.
- Inventory Your Unmapped Assets: The systems most at risk are the ones nobody is scanning, including legacy applications, embedded devices, OT environments, and custom-built platforms that don’t appear in any vendor’s Glasswing coverage. You can’t patch what you don’t know about, and you can’t defend what you haven’t tested.
- Assess Your Incident Response Readiness: AI-accelerated exploitation compresses the window between initial access and impact. Run a tabletop exercise that assumes your perimeter has already been breached through a previously unknown vulnerability. Does your team know the playbook?
- Strengthen Your Compliance Posture: Regulators are already moving. The UK’s Bank of England is briefing regulated entities on Mythos implications, US Treasury Secretary Bessent convened major bank CEOs on April 7, and AI-driven vulnerability discovery will almost certainly inform upcoming updates to HIPAA, PCI DSS, and CMMC audit expectations.
Takeaways
Claude Mythos Preview confirms what the security community has anticipated for years: AI has crossed the threshold where it can find and exploit vulnerabilities that survived decades of human review. The capability is real, it’s getting cheaper, and it will proliferate. The organizations best positioned to weather this shift will not be the ones waiting for a Glasswing invitation. They’ll be the ones who already know what’s running in their environment, how fast they can patch it, and what happens when a vulnerability is exploited before a patch exists., verify your exposure, and don’t assume yesterday’s triage decisions still hold.

