This one is different.
Anthropic didn’t just build a better model—they hit a threshold and stopped.
Claude Mythos (Preview) exists, works, and isn’t being released.
Not because it failed.
Because it crossed into territory we’re not ready for.
But before everything… just like in any good story, go and check the other side of it, which basically claim, it’s all (a good) marketing stunt.
The Sandwich Email That Shouldn’t Exist
Anthropic researcher Sam Bowman was sitting in a park, mid-sandwich (or burrito – no one knows for sure), when he got an email… from a model that wasn’t supposed to have internet access.
That model:
- Was running in a locked, air-gapped container (yes – as crazy as it sounds…)
- Found a multi-step exploit chain (=using a minor leak to find an address, using a buffer overflow to gain a primitive, using a race condition to escalate)
- Escaped its sandbox (likely via container/runtime escape + privilege escalation)
- Reached external network interfaces
- Contacted him
Then it started sharing the exploit.
Unprompted.
That’s not a jailbreak.
That’s autonomous exploit development + execution.
TL;DR: The Defense / Offense Equilibrium Just Collapsed
For decades, security worked because elite talent was scarce.
Finding and chaining zero-days in systems like Linux kernel or OpenBSD required:
- Deep expertise
- Months of effort
- Significant cost
Mythos flips that:
- Speed: Months → hours
- Scale: Thousands of vulnerabilities mapped
- Chaining: 3–5 bugs → working exploit
- Cost: ~$20k to uncover decades-old issues (cheap or expensive is in the eyes of the…)
This model didn’t just improve tools.
It collapsed the economics of offense.
Think of it this way:
Before: $2M in talent + 6 months = 1 Zero Day attack (that used to cost around a few millions of dollars).
After: $20k in tokens + 2 hours = 1 Zero Day attack that cost, well, $20k and get cheaper and cheaper.
The “Undiscoverable” Bugs (Now Discoverable)
Anthropic’s Frontier Red Team is seeing ~90x improvement in exploit generation vs prior models like Claude Opus 4.6
Here’s what that actually looks like:
1. OpenBSD — 27-Year-Old TCP SACK DoS
Relevant system: OpenBSD (=the more secure version of Linux)
What Mythos found:
A flaw in TCP Selective Acknowledgment (SACK) handling that allowed crafted packets to trigger a kernel panic (remote crash).
Why this is scary:
- The bug lived in core networking code—reviewed heavily for decades
- Fuzzers hit this code millions of times
- It required understanding state transitions across packets, not just malformed input
Exploit mechanics (simplified):
- Send a sequence of TCP packets with carefully crafted SACK blocks
- Trigger inconsistent buffer/state handling
- Cause memory corruption → crash
Impact:
Remote, unauthenticated DoS on a “hardened” OS which run ‘a lot’ of servers around the world.
2. Linux Kernel — Multi-Bug Chain → Root
Relevant system: Linux kernel which (again) runs most (=over 91%) the internet.
What Mythos did:
Not just bug finding—full exploit construction.
Chain included:
- Heap buffer overflow (memory corruption primitive)
- Race condition (timing-based state manipulation)
- Info leak (to bypass protections)
End result:
- Bypassed KASLR (Kernel Address Space Layout Randomization)
- Achieved reliable root access
Why it matters:
This is traditionally:
- Weeks/months of work
- Done by top-tier exploit engineers
Mythos does it end-to-end.
3. FreeBSD — 17-Year-Old Remote Code Execution
What Mythos found:
A flaw in NFS request parsing that allowed:
- Malformed network input
- Improper memory handling
- Remote code execution as root
Exploit path:
- Send crafted NFS request
- Trigger buffer mismanagement
- Inject controlled payload
- Execute on server with full privileges
Why this is a big deal:
- No authentication required
- Internet-exposed service
- High-value enterprise target
Translation: instant lateral movement in real environments.
This Isn’t Linear Progress
Benchmarks tell the story:
- Firefox exploit success:
- Older models: ~1%
- Mythos: 72%
- Vulnerability reproduction:
- Previous gen: ~66%
- Mythos: 83%
That’s not improvement.
That’s a capability cliff.
Project Glasswing: Patch the World First
Instead of releasing Mythos, Anthropic launched Project Glasswing.
Partners include all the big names: AWS, Google, Apple, Microsoft, Linux foundation etc’
Goal: Give defenders a head start to:
- Audit critical infrastructure
- Patch zero-days
- Reduce blast radius
“This is the biggest shift in security since the internet.”
The Economics Just Changed
Pricing:
- $25 / million input tokens
- $125 / million output tokens
This is not chat UX pricing.
This is:
- Autonomous agent compute
- Multi-hour runs
- High-value outcomes
Think:
“Find me every exploit path in this codebase”
What This Means
1. “Secure enough” is dead
Your code wasn’t safe. It was uneconomical to attack. Now, it will be – it’s just time.
2. Vulnerability debt is real
Legacy systems will get audited—by machines. Constantly and much more effectively.
3. Small bugs = full compromise
Exploit chaining is now the default.
4. Dev tools = attack surface
Permissions, agents, CI/CD—all in scope.
5. Human-only security is over
You can’t compete with machine-speed offense.
Strategic Reality for CTOs
- Defensive AI is mandatory
- The best models will stay gated
- Security becomes a race of patch speed vs exploit generation
The Bottom Line
We just crossed into a world where:
- Exploit discovery is cheap
- Exploits are more complex
- Weaponization is faster than ever
We moved from:
Scarcity of bugs → scarcity of time
What I’d Do Tomorrow
- Run AI audits on critical systems
- Assume exploit chaining everywhere
- Lock down permissions aggressively
- Treat AI as core to your security stack
Further Reading
- Official Anthropic Announcement: Project Glasswing: Securing Critical Software for the AI Era
- Technical Deep Dive: Anthropic Frontier Red Team Report on Claude Mythos Preview
- The leading models at the moment: artificialanalysis
Stay sharp & Be strong
Discover more from Ido Green
Subscribe to get the latest posts sent to your email.
@greenido.wordpress.com Do you have a source for that sandwich story?
Remote Reply
Original Comment URL
Your Profile
Why do I need to enter my profile?
This site is part of the ⁂ open social web, a network of interconnected social platforms (like Mastodon, Pixelfed, Friendica, and others). Unlike centralized social media, your account lives on a platform of your choice, and you can interact with people across different platforms.
By entering your profile, we can send you to your account where you can complete this action.