Large Language Models

Claude Mythos Finds Zero-Day Vulnerabilities in OSes

Anthropic's new AI beast, Claude Mythos Preview, sniffed out thousands of zero-day vulnerabilities across operating systems and browsers. But they're not unleashing it—yet.

Anthropic's Claude Mythos AI scanning code for vulnerabilities in operating systems and browsers

Key Takeaways

  • Claude Mythos Preview found thousands of zero-day vulnerabilities in all major OSes and browsers.
  • Anthropic's Project Glasswing partners with tech giants to patch bugs before public release.
  • The model achieves full exploits (tier 5) on fully patched targets, far beyond prior AIs.

AI’s now the world’s deadliest debugger.

Imagine a digital bloodhound, nose to the ground, ripping through code like a fox through underbrush— that’s Claude Mythos Preview, Anthropic’s latest model that’s unearthed thousands of high-severity vulnerabilities in every major operating system and web browser. We’re talking zero-days, some festering unpatched for decades, like that 27-year-old OpenBSD flaw that could crash a system with a mere connection. This isn’t hype; it’s a platform shift, where AI doesn’t just write code—it breaks it, systematically, at scales humans dream of.

And here’s the kicker: Anthropic’s not dropping this bomb on the world. No sir. They’ve rallied the titans—Amazon, Apple, Google, Microsoft, Nvidia, even the US government—under Project Glasswing to patch these holes before some wild-west AI lab turns them into weapons.

What Makes Claude Mythos a Hacking Monster?

Look, current AIs like Claude’s earlier versions spot bugs okay, but chaining them into exploits? Nah, they flop. Mythos? It nails 72.4% of those into working attacks in Firefox’s JavaScript shell, snagging register control in another 11.6%. Picture this: it crafted a browser exploit linking four vulns, spraying a complex JIT heap to bust out of renderer and OS sandboxes. That’s nation-state hacker territory, handed to a machine.

“We regularly run our models against roughly a thousand open source repositories from the OSS-Fuzz corpus, and grade the worst crash they can produce on a five-tier ladder of increasing severity, ranging from basic crashes (tier 1) to complete control flow hijack (tier 5).”

Sonnet 4.6 and Opus 4.6? A measly tier 3 here and there. Mythos Preview? Full tier 5 hijacks on ten fully patched targets. Boom.

Real-world carnage: a 16-year-old FFmpeg bug, slammed by five million tests without a peep; a Linux kernel chain for root access. Thousands more, less than 1% patched so far. It’s like AI peeked behind the curtain of our digital foundations and yelled, “Fire!”

But—pause for breath—this power terrifies even its creators. Anthropic’s Frontier Red Team warns: unleash this without rails, and script kiddies wield nukes. Hence the lockdown.

Why the Secret Bug-Hunting Club?

Project Glasswing’s no casual collab. It’s Amazon Web Services, Cisco, CrowdStrike, JPMorganChase, Linux Foundation, Palo Alto—over 40 orgs total, plus Uncle Sam chatting offensive/defensive cyber implications. Smart move, right? Get the fixes in before competitors’ AIs go rogue.

Anthropic’s playing chess while others play checkers. They’re sharing Mythos’s eyes with the right folks, documenting via system cards, no public release. Responsible? Absolutely. But it smells like a flex too—“Look what we can do, and we’re the good guys holding back.”

Here’s my unique take, absent from their post: this echoes the 1988 Morris Worm, first internet-wide exploit from a single bug chain. Back then, it exposed our fragility; Mythos exposes it exponentially. Bold prediction? Within two years, AI-driven patching will be mandatory, birthing “self-healing software” stacks—think immune systems for code, ending legacy bug hell like antibiotics crushed tuberculosis.

Can Big Tech Keep Up with AI’s Bug Avalanche?

Short answer: barely. Thousands of zero-days? Every OS, every browser? That’s not a drip; it’s a deluge. OpenBSD, hardened fortress of security, breached after 27 years. FFmpeg, multimedia kingpin, blind-sided for 16.

Anthropic’s disclosure sparks a frantic race—partners scrambling, but volume’s insane. Fewer than 1% fixed. What if a rival drops an open Mythos clone tomorrow? Cyber apocalypse lite.

Yet wonder surges. AI as platform shift means bugs become features—wait, no, fuel for evolution. Software firms will pivot: integrate these hunters into CI/CD pipelines, turning red teams obsolete. Energy here? Electric. We’re watching codebases mutate in real-time.

Skeptical? Sure, Anthropic spins the “seismic shift” narrative hard (echoes their blog). But numbers don’t lie—595 crashes at tiers 1-2, tier 5 hijacks. This is real disruption, not PR fluff.

A single sentence: Pace yourself, industry—this AI’s just warming up.

And sprawl: We’ve got FFmpeg’s ghost, OpenBSD’s skeleton, Linux root escalations—each a thread in the mix (wait, no tapestries, scratch that) of vulnerabilities Mythos unravels, forcing a reckoning where patching lags creation, but AI flips the script, hunting faster than humans hoard flaws, promising a fortified digital tomorrow if we don’t botch the rollout.

Is Claude Mythos Preview Coming to You?

Nope. Restricted access, system card teases. Long-term? Groundwork for safer AI arms race.

But imagine: your browser, OS, auto-patched by AI watchdogs. Wonderment.


🧬 Related Insights

Frequently Asked Questions

What is Claude Mythos Preview?

Anthropic’s advanced AI model that detects and exploits thousands of zero-day vulnerabilities in major OSes and browsers.

How many vulnerabilities did Claude Mythos find?

Thousands of high-severity ones, including some unpatched for decades, across every major operating system and web browser.

Will Anthropic release Claude Mythos publicly?

No, it’s restricted to partners via Project Glasswing for responsible disclosure and patching.

Sarah Chen
Written by

AI research editor covering LLMs, benchmarks, and the race between frontier labs. Previously at MIT CSAIL.

Frequently asked questions

What is Claude Mythos Preview?
Anthropic's advanced AI model that detects and exploits thousands of zero-day vulnerabilities in major OSes and browsers.
How many vulnerabilities did Claude Mythos find?
Thousands of high-severity ones, including some unpatched for decades, across every major operating system and web browser.
Will Anthropic release Claude Mythos publicly?
No, it's restricted to partners via Project Glasswing for responsible disclosure and patching.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by Tom's Hardware - AI

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.