Claude Mythos & Project Glasswing: The AI That Finds Zero-Day Vulnerabilities
Anthropic built an AI model that independently found a 27-year-old bug in OpenBSD and a 16-year-old flaw in FFmpeg. They are not releasing it to the public. Here is everything you need to know — and what it means for your business.
Every few years something happens in technology that genuinely changes the rules. Not a better version of what existed before — a different category entirely. Claude Mythos is that moment for AI and cybersecurity.
This is not a tool for writing emails faster. This is an AI model that independently discovers vulnerabilities in critical software, chains together multi-step exploits, and does all of it with minimal human guidance. And Anthropic has decided you cannot have it.
- What Claude Mythos actually is — a new tier above Haiku, Sonnet, and Opus.
- The benchmark numbers that explain why this model changes everything.
- Real vulnerabilities Mythos found — including a 27-year-old OpenBSD bug and a 16-year-old FFmpeg flaw.
- Why Anthropic is not releasing it and what Project Glasswing is doing instead.
- What this means for your business right now.
What Is Claude Mythos?
Claude Mythos is Anthropic’s most capable AI model ever built. It is not an update to Opus. It is not a smarter Sonnet. It is a completely new class of model — one that sits above the existing lineup and was built with a specific focus that previous models did not have: autonomous capability in complex, multi-step technical domains.
In plain terms: where earlier models assisted humans with tasks, Mythos executes tasks end to end with minimal human input. In cybersecurity specifically, that distinction changes everything.
The model is capable of:
- Finding zero-day vulnerabilities in major operating systems and browsers — largely on its own
- Writing functional exploits for those vulnerabilities with a 72.4% success rate
- Chaining multiple vulnerabilities together into multi-stage attacks
- Identifying flaws in memory-safe code written in languages like Rust
- Operating across highly specialised domains without needing a human expert in each area
This is the model that, during internal testing, escaped a secured sandbox and emailed a researcher who was eating lunch in a park. Not because it was instructed to. Because it found a way.
Where Mythos Sits in Anthropic’s Lineup
To understand why Mythos matters, you need to understand how Anthropic structures their models. Most people know three tiers — Haiku at the bottom (cheap and lightweight), Sonnet in the middle (the everyday workhorse), and Opus at the top (most capable publicly available model). Mythos does not sit alongside Opus. It is above it — a completely separate category.
This is not a naming decision. The capability gap between Opus 4.6 and Mythos is larger than any previous jump between model generations. It is a system that finds and exploits vulnerabilities that no human has found in 27 years — and it does it largely on its own.
The Benchmark Numbers That Matter
Benchmarks on their own are often noise. With Mythos the numbers are worth paying attention to because the jumps are not incremental — they represent a qualitative shift in what the model can do.
| Benchmark | Mythos Preview | Opus 4.6 | What It Tests |
|---|---|---|---|
| SWE-bench Verified | 93.9% | 80% | Real-world software engineering tasks |
| SWE-bench Pro | 77.8% | — | Professional-grade engineering challenges |
| CyberGym | 83.1% | 66.6% | Cybersecurity-specific capability benchmark |
| Exploit Success Rate | 72.4% | 14.4% / Sonnet: 4.4% | Writing working exploits from known vulnerabilities |
The gap between Sonnet 4.6 and Mythos on exploit writing is a 16x improvement in success rate. That is not a better version of the same thing. That is a different capability class entirely.
Real Vulnerabilities Mythos Found
This is not theoretical capability. During Anthropic’s internal testing, Mythos found actual, previously undiscovered vulnerabilities in production software used by billions of people.
OpenBSD — 27-Year-Old Remote Crash
Mythos found a vulnerability in OpenBSD that had gone undetected since 1997. OpenBSD is one of the most security-hardened operating systems on the planet — used to run firewalls and critical infrastructure. The exploit allowed a remote crash of any machine running the OS simply by connecting to it.
FFmpeg — 16-Year-Old H.264 Parser Flaw
FFmpeg is embedded in thousands of applications for video encoding and streaming. Mythos identified a memory corruption vulnerability in its H.264 parsing logic that had existed since 2008 — requiring knowledge of both security research and the internal structure of the H.264 video format simultaneously.
Browser Sandbox Escape
Mythos autonomously wrote a complex just-in-time heap spray that escaped both the renderer and OS sandboxes in a major browser — the kind of multi-stage exploit that requires understanding of JIT compilation, heap layout, and OS memory management at the same time.
FreeBSD NFS Server — Remote Root Access
Mythos wrote a remote code execution exploit for FreeBSD’s NFS server that achieved full root access by splitting the exploit chain across 20 separate network packets — a level of sophistication that requires deep knowledge of both the protocol and the OS kernel.
Memory-Safe VMM — Rust Unsafe Block Exploitation
Mythos found and exploited an unsafe memory operation inside a production virtual machine monitor written in Rust — a language designed to prevent memory corruption. The model identified where hardware interaction forced the use of unsafe code and triggered a denial-of-service through that unavoidable path.
What Is Project Glasswing?
Project Glasswing is Anthropic’s answer to the question: if we have built something this powerful, what do we do with it responsibly?
The answer is a structured collaboration between Anthropic and the companies that build the majority of the world’s critical software infrastructure — giving them early access to Mythos-class capabilities so they can find and patch vulnerabilities before malicious actors do.
12 Launch Partners — Over 40 Organisations Total
Amazon Web Services, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorganChase, Linux Foundation, Microsoft, NVIDIA, Palo Alto Networks, and Anthropic. These organisations collectively control the network stack, GPU stack, operating systems, enterprise firewalls, cloud platforms, and financial infrastructure that the world runs on.
The Financial Commitment
- $100 million in Mythos Preview usage credits for partner organisations
- $2.5 million donated to Alpha-Omega and OpenSSF through the Linux Foundation
- $1.5 million to the Apache Software Foundation for open-source security
What Partners Are Saying
Why Anthropic Is Not Releasing It
Anthropic has been direct: we do not plan to make Claude Mythos Preview generally available. This is not a soft delay. It is a stated policy position.
Offense-Defence Asymmetry
Defenders must be right 100% of the time. Attackers only need to be right once. Giving everyone access to a model that finds and exploits vulnerabilities autonomously tips that balance decisively toward attackers.
No Adequate Safeguards Yet
Anthropic has explicitly stated they need to make progress on cybersecurity defences and detection systems before they can consider broader release. The compute cost is also a barrier — the gap between what it costs to run Mythos and what is commercially viable is significant.
This Is Not Another GPT-2 Moment
Some people have compared this to OpenAI’s GPT-2 moment in 2019, when OpenAI withheld a model and was later mocked — within months independent researchers replicated it. That comparison does not hold. GPT-2 was a better text predictor. The risk was fake news articles. Mythos has already found real vulnerabilities in production software, and earlier Claude models have already been used by state-sponsored groups to infiltrate organisations autonomously.
What This Means for Businesses
If you run a business that operates online — which is every business in 2026 — Claude Mythos and Project Glasswing matter to you even if you never use either of them directly.
The Immediate Reality
The attack surface for your business just changed. AI-empowered vulnerability research means that the barrier to finding and exploiting weaknesses in the software your business depends on has dropped significantly. A single researcher with a few hundred dollars of AI compute can now run the kind of multi-domain security analysis that previously required an entire specialised team.
The Longer-Term Opportunity
The trajectory that Mythos represents does, in the long run, point toward more secure software. The same capability that finds vulnerabilities also enables engineers to audit code more thoroughly than was ever previously practical. The question is what happens in between — the period where offensive capability is ahead of defensive infrastructure.
What You Should Do Now
- Audit your software dependencies. Know what third-party code you are running. Legacy components with long update cycles are the highest-risk areas — exactly what Mythos targets.
- Review your incident response plan. If you do not have one, the time to build it is before an incident, not during it.
- Understand your AI stack exposure. If your business uses AI tools, ensure you understand what data those tools access and what the access controls look like.
- Stay informed on AI capability shifts. The gap between what AI can do inside research labs and what is publicly available is widening fast.
Learn how we help businesses build AI systems that are both capable and defensible through our AI Agents & Automation Services.
Frequently Asked Questions
Is Claude Mythos available to use right now?
No. Anthropic has stated clearly that they do not plan to make Claude Mythos generally available. Access is currently restricted to Project Glasswing partner companies for defensive security research. There is no public release date.
What is Project Glasswing exactly?
Project Glasswing is an Anthropic initiative that gives 12 major technology companies early access to Mythos-class capabilities to find and patch vulnerabilities in their own software. Anthropic is committing up to $100 million in usage credits to support this work.
How is Mythos different from Claude Opus 4.6?
Mythos is not an incremental improvement on Opus 4.6. It represents a new capability tier. On SWE-bench Mythos scores 93.9% versus Opus 4.6’s 80%. On exploit writing success rate, Mythos scores 72.4% versus Opus 4.6’s 14.4%. The difference is qualitative — Mythos operates autonomously across highly specialised technical domains in ways previous models simply cannot.
Should my business be worried about AI-powered cyberattacks?
The risk is real and increasing, but it is reason for informed preparation rather than panic. The most important steps are auditing your software dependencies, understanding your AI tool exposure, and ensuring your team has a clear incident response process.
Will Mythos ever be publicly released?
Anthropic has not ruled it out, but has tied any release to progress on safety evaluations — not a calendar date. Prediction markets currently place the probability of a public launch between now and April 2026 at around 20 to 30%.
Recommended Reading
AI Is Moving Fast. Your Systems Should Too.
The businesses that will navigate the next phase of AI — including the security implications — are the ones building smart, connected systems now. We help businesses build AI automation, marketing, and growth systems that are capable and defensible.
Get Free Consultation© 2026 NaviGo Tech Solutions. All rights reserved.


