{"id":12990,"date":"2026-04-17T16:17:48","date_gmt":"2026-04-17T08:17:48","guid":{"rendered":"https:\/\/ai-stack.ai\/?p=12990"},"modified":"2026-04-17T16:26:54","modified_gmt":"2026-04-17T08:26:54","slug":"claude-mythos-project-glasswing","status":"publish","type":"post","link":"https:\/\/ai-stack.ai\/en\/claude-mythos-project-glasswing","title":{"rendered":"What Is Claude Mythos? Why Anthropic Won&#8217;t Release Its Most Powerful AI Model\u2014Capabilities, Glasswing, and the Global Cybersecurity Shockwave"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">On April 7, 2026, Anthropic did something unprecedented in the AI industry: it announced its most powerful model ever built\u2014and simultaneously declared it <strong>would not be made publicly available<\/strong>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The model is called <strong>Claude Mythos Preview<\/strong>, a general-purpose frontier large language model. It represents a generational leap in coding, reasoning, and agentic capabilities, but what truly alarmed Anthropic into withholding it was its cybersecurity prowess\u2014Mythos can autonomously discover and exploit security vulnerabilities in virtually all mainstream software, with speed and precision that far surpass human security experts. In response, Anthropic launched<a href=\"https:\/\/www.anthropic.com\/glasswing\" target=\"_blank\" rel=\"noopener\"> Project Glasswing<\/a>, a defensive cybersecurity initiative that restricts the model to a select group of technology partners.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This article provides a comprehensive breakdown of the Mythos event\u2014from its technical capabilities and industry impact to government reactions and what enterprises should do next.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What Can Mythos Actually Do? Three Numbers That Spooked Anthropic<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Before diving deeper, consider three data points that explain why Mythos has generated such extraordinary attention.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>First, the scale of vulnerability discovery.<\/strong> According to<a href=\"https:\/\/red.anthropic.com\/2026\/mythos-preview\/\" target=\"_blank\" rel=\"noopener\"> Anthropic&#8217;s Frontier Red Team technical report<\/a>, the team used Mythos over several weeks and found zero-day vulnerabilities\u2014previously unknown, unpatched security flaws\u2014in <strong>every major operating system and every major web browser<\/strong>. The total count reached <strong>thousands of high-severity vulnerabilities<\/strong>, with over 99% still unpatched at the time of announcement.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Second, the exploit development leap.<\/strong> Finding a vulnerability is one thing; turning it into a working exploit is an entirely different level of capability. Anthropic benchmarked this using Firefox 147&#8217;s JavaScript engine: the previous flagship model, Claude Opus 4.6, succeeded in producing working exploits only 2 times out of several hundred attempts. Mythos succeeded <strong>181 times<\/strong>\u2014a <strong>90x performance jump<\/strong> in a single model generation.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Third, the autonomy shift.<\/strong> Anthropic engineers with no formal security training asked Mythos to find remote code execution vulnerabilities overnight and woke up the next morning to a complete, working exploit. No human intervention required. In another case, Mythos autonomously chained four separate vulnerabilities, writing a complex JIT heap spray that escaped both the browser&#8217;s renderer sandbox and the OS sandbox.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">These capabilities were not explicitly trained. According to Anthropic, they emerged as a natural byproduct of general improvements in code understanding, reasoning, and autonomy. In other words, a model that is better at writing and fixing code is simultaneously better at finding and exploiting its flaws.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The &#8220;Fossil-Grade&#8221; Bugs Mythos Unearthed<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The vulnerabilities Mythos found are not shallow, surface-level issues that conventional tools could catch. They are deep, subtle flaws that survived decades of human auditing and automated scanning.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The most striking examples include a <strong>27-year-old<\/strong> TCP SACK vulnerability in OpenBSD\u2014an operating system famous for its security\u2014where just two crafted packets could crash any server running it; a <strong>16-year-old<\/strong> out-of-bounds write flaw in FFmpeg&#8217;s H.264 codec that fuzzers had tested 5 million times without triggering; and a <strong>17-year-old<\/strong> remote code execution vulnerability in FreeBSD&#8217;s NFS implementation (CVE-2026-4747) that grants full root access to unauthenticated attackers.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">According to<a href=\"https:\/\/venturebeat.com\/security\/mythos-detection-ceiling-security-teams-new-playbook\" target=\"_blank\" rel=\"noopener\"> VentureBeat&#8217;s in-depth analysis<\/a>, the entire research campaign that discovered the OpenBSD bug cost approximately $20,000 across 1,000 full runs. The single successful run cost under $50. When AI reduces top-tier security research to this cost level, the entire economics of offense and defense changes fundamentally.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Project Glasswing: Using the Sharpest Sword to Build the Strongest Shield<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Faced with these capabilities, Anthropic chose a counterintuitive strategy: don&#8217;t sell it, don&#8217;t release it, defend first.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">They simultaneously launched <strong>Project Glasswing<\/strong>, a defensive cybersecurity initiative that assembles the world&#8217;s leading technology companies. The name references the glasswing butterfly, whose wings are nearly transparent\u2014a metaphor for software vulnerabilities that exist but remain invisible.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Twelve launch partners<\/strong> include Amazon Web Services, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorgan Chase, the Linux Foundation, Microsoft, NVIDIA, and Palo Alto Networks. An additional <strong>40+ organizations<\/strong> that build or maintain critical software infrastructure also received access.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Anthropic committed up to <strong>$100 million in usage credits<\/strong> and an additional <strong>$4 million in donations<\/strong> to open-source security organizations. Beyond the credits, Mythos is priced at $25 per million input tokens and $125 per million output tokens, accessible via the Claude API, Amazon Bedrock, Google Cloud Vertex AI, and Microsoft Foundry.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The core logic is straightforward: give defenders a head start by using Mythos to find and patch as many vulnerabilities as possible before attackers develop comparable capabilities. Anthropic has committed to publishing a public findings report <strong>within 90 days<\/strong> (approximately early July 2026).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This strategy is fundamentally a race against time. According to<a href=\"https:\/\/www.nbcnews.com\/tech\/security\/anthropic-project-glasswing-mythos-preview-claude-gets-limited-release-rcna267234\" target=\"_blank\" rel=\"noopener\"> NBC News reporting<\/a>, Anthropic&#8217;s offensive cyber research lead Logan Graham emphasized that Mythos&#8217;s distinguishing capability is its ability to autonomously chain multiple vulnerabilities into complex, multi-step attacks. Multiple cybersecurity experts estimate that open-source models with similar capabilities could emerge within <strong>12 to 18 months<\/strong>. Once those capabilities become widely accessible, any ransomware group or state-sponsored hacker could discover and weaponize vulnerabilities at scale for minimal cost.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Wall Street and Government Panic<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Mythos&#8217;s impact rapidly spread from the tech world into finance and government.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>United States: Treasury Secretary convenes emergency bank CEO meeting.<\/strong> According to<a href=\"https:\/\/www.cnbc.com\/2026\/04\/10\/powell-bessent-us-bank-ceos-anthropic-mythos-ai-cyber.html\" target=\"_blank\" rel=\"noopener\"> CNBC&#8217;s exclusive reporting<\/a>, on April 8, Treasury Secretary Scott Bessent and Federal Reserve Chair Jerome Powell convened an emergency closed-door meeting at Treasury headquarters. Attendees included Citigroup CEO Jane Fraser, Goldman Sachs CEO David Solomon, Bank of America CEO Brian Moynihan, Wells Fargo CEO Charlie Scharf, and Morgan Stanley CEO Ted Pick. JPMorgan CEO Jamie Dimon was invited but unable to attend. As<a href=\"https:\/\/fortune.com\/2026\/04\/10\/bessent-powell-anthropic-mythos-ai-model-cyber-risk\/\" target=\"_blank\" rel=\"noopener\"> Fortune reported<\/a>, this was a rare instance of the nation&#8217;s top financial regulators personally convening bank leaders over an AI threat\u2014signaling that the US government now views AI-driven cyberattacks as a <strong>systemic financial risk<\/strong>, not merely an IT concern.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>United Kingdom: AISI independent evaluation confirms capability jump.<\/strong> The UK government&#8217;s AI Security Institute (AISI) conducted an<a href=\"https:\/\/www.aisi.gov.uk\/blog\/our-evaluation-of-claude-mythos-previews-cyber-capabilities\" target=\"_blank\" rel=\"noopener\"> independent evaluation<\/a> of Mythos. On expert-level Capture the Flag challenges, Mythos achieved a <strong>73% success rate<\/strong>\u2014before April 2025, no AI model could complete a single expert-level task. More critically, AISI designed its own 32-step corporate network attack simulation called &#8220;The Last Ones&#8221; (spanning initial reconnaissance to full network takeover), estimated to take human experts approximately 20 hours. <strong>Mythos was the first AI model in history to complete this test end-to-end<\/strong>, succeeding in 3 out of 10 attempts and averaging 22 out of 32 steps. AISI described it as &#8220;a step up over previous frontier models.&#8221;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Financial sector chain reaction.<\/strong> Goldman Sachs CEO David Solomon publicly stated on an earnings call that the bank is working &#8220;closely&#8221; with Anthropic and is &#8220;accelerating&#8221; cybersecurity investment. In the UK, the Bank of England&#8217;s Cross Market Operational Resilience Group (CMorg) is expected to hold a Mythos-focused briefing within the fortnight, with attendees from the Treasury, the National Cyber Security Centre (NCSC), and the Financial Conduct Authority (FCA). IMF Managing Director Kristalina Georgieva stated in an interview that the global financial system is currently unable to protect itself against massive AI-driven cyber risks.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Skeptical Voices: Is Mythos Really That Unique?<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Amid the wave of coverage, several cybersecurity experts have pushed back.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Stanislav Fort, founder and chief scientist at cybersecurity firm Aisle, conducted a<a href=\"https:\/\/aisle.com\/blog\/ai-cybersecurity-after-mythos-the-jagged-frontier\" target=\"_blank\" rel=\"noopener\"> counter-experiment<\/a>: his team isolated the specific vulnerable code from Anthropic&#8217;s showcase examples and ran them through small, open-source models. The result was that <strong>8 out of 8 models<\/strong> successfully detected the FreeBSD NFS flagship vulnerability, including one with only 3.6 billion active parameters costing $0.11 per million tokens. Aisle&#8217;s conclusion: vulnerability <strong>detection<\/strong> capabilities may already be broadly accessible, and Anthropic&#8217;s narrative overstates how exclusive these capabilities are.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Renowned security researcher Bruce Schneier offered a different angle on his<a href=\"https:\/\/www.schneier.com\/blog\/archives\/2026\/04\/on-anthropics-mythos-preview-and-project-glasswing.html\" target=\"_blank\" rel=\"noopener\"> personal blog<\/a>, arguing that the announcement was largely a successful PR play by Anthropic. He noted that many journalists simply repeated Anthropic&#8217;s talking points without critical engagement. However, Schneier acknowledged that AI capabilities in security are genuinely approaching a tipping point.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The key distinction, however, lies in the gap between detection and autonomous end-to-end exploitation. Aisle tested whether models could identify a known vulnerability when given the specific code. What Mythos demonstrated was autonomously finding unknown vulnerabilities across millions of lines of code and chaining multiple bugs into complete attack sequences\u2014a fundamentally different and more sophisticated capability.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Anthropic&#8217;s Impossible Triangle: Safety, Business, and Politics<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The Mythos event also exposed the delicate position Anthropic currently occupies.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">On the safety-versus-business axis, Anthropic chose not to release Mythos publicly\u2014consistent with its brand as a safety-focused AI lab. But this also means forgoing a massive commercial opportunity, as Mythos is its most capable model yet, generating revenue only through limited channels.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">On the safety-versus-politics axis, things get more complicated. Around the same time as the Mythos launch, Anthropic was facing a dispute with the US Department of Defense, which designated the company as a &#8220;supply chain risk&#8221; after Anthropic insisted on limiting military use of its AI technology. President Trump and Defense Secretary Pete Hegseth publicly criticized the company. According to<a href=\"https:\/\/www.euronews.com\/next\/2026\/04\/14\/why-anthropics-new-mythos-ai-model-has-washington-and-wall-street-worked-up\" target=\"_blank\" rel=\"noopener\"> Euronews reporting<\/a>, Anthropic&#8217;s co-founder stated at the Semafor World Economy event that he didn&#8217;t want the political dispute to interfere with national security cooperation.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Another important piece of context: just two weeks before Mythos&#8217;s official launch,<a href=\"https:\/\/ai-stack.ai\/en\/claude-code-leak\"> Anthropic&#8217;s Claude Code tool suffered a major source code leak<\/a>, exposing 512,000 lines of TypeScript and 44 hidden features. Two high-profile incidents in rapid succession put additional pressure on a company whose core brand promise is safety.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Enterprise Implications: A Survival Guide for the AI Cybersecurity Era<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Regardless of whether Mythos&#8217;s capabilities have been overstated, the trend it represents is real and irreversible: <strong>AI is fundamentally reshaping the economics and speed of cybersecurity offense and defense.<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For enterprise decision-makers, several key takeaways deserve attention.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Patching speed becomes a matter of survival.<\/strong> When AI can automatically generate working exploits within hours of a vulnerability disclosure, the traditional monthly patch cycle is no longer sufficient. Anthropic&#8217;s technical report explicitly recommends that enterprises dramatically reduce time-to-deploy for security updates, enable auto-update wherever possible, and treat dependency updates containing CVE fixes as urgent rather than routine maintenance.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Foundational security measures matter more than ever.<\/strong> UK AISI&#8217;s evaluation concluded that Mythos can currently breach &#8220;systems with weak security posture.&#8221; Regular updates, robust access controls, secure configuration, and comprehensive logging\u2014these seemingly basic practices become the most critical defense line in the age of AI-powered attacks.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>AI infrastructure security governance needs upgrading.<\/strong> As enterprises deploy increasingly heavy AI workloads,<a href=\"https:\/\/ai-stack.ai\/en\/how-to-increase-gpu-utilization\"> GPU resource management and security configuration<\/a> become more critical. AI training and inference environments can themselves become attack targets, and enterprises scaling their AI infrastructure need to embed security into every layer of their architecture\u2014from<a href=\"https:\/\/ai-stack.ai\/en\/asic-vs-gpu\"> hardware selection<\/a> to containerized deployment.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Defense can also use AI.<\/strong> This is the most overlooked aspect of the Mythos story. The same capabilities, when applied defensively, can automatically and continuously scan enterprise codebases at scale, patching vulnerabilities before attackers find them. As Anthropic stated, once a new equilibrium is established, AI will ultimately benefit defenders more than attackers. But the transition period will be turbulent.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>After Mythos: The Future of AI Cybersecurity<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Mythos is not the endpoint\u2014it is a signal.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Anthropic has acknowledged that these capabilities are not unique to Mythos; they are a natural extension of continued improvements in general model capabilities. This means OpenAI, Google, and even the open-source community will eventually reach comparable levels. Alex Stamos, chief product officer at cybersecurity firm Corridor, estimates that open-source models will catch up to frontier models in vulnerability discovery in roughly six months.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Over a longer time horizon, this transformation will redefine the fundamental assumptions of software security. The decades-old paradigm of &#8220;manual auditing plus automated scanning&#8221; is giving way to &#8220;AI-driven autonomous offense and defense with real-time patching.&#8221; A<a href=\"https:\/\/www.csoonline.com\/article\/4158117\/anthropics-mythos-signals-a-structural-cybersecurity-shift.html\" target=\"_blank\" rel=\"noopener\"> recent white paper from the Cloud Security Alliance<\/a>\u2014co-authored by former CISA Director Jen Easterly, Bruce Schneier, and dozens of cybersecurity leaders\u2014reached a direct conclusion: Glasswing is not an outlier but an early example of a capability paradigm that will proliferate, and security teams should begin preparing for this new era immediately.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For enterprises building or expanding AI infrastructure, now is the optimal time to reassess security strategies across the stack\u2014from<a href=\"https:\/\/ai-stack.ai\/en\/whats-gaas\"> cloud GPU services (GaaS)<\/a> to on-premises deployment architectures. In a world where AI capabilities are growing exponentially, infrastructure security is no longer optional\u2014it is a core competitive advantage.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><em>This article was produced by the INFINITIX team. Sources include<\/em><a href=\"https:\/\/www.anthropic.com\/glasswing\" target=\"_blank\" rel=\"noopener\"><em> <\/em><em>Anthropic&#8217;s official announcements<\/em><\/a><em>, the<\/em><a href=\"https:\/\/red.anthropic.com\/2026\/mythos-preview\/\" target=\"_blank\" rel=\"noopener\"><em> <\/em><em>Frontier Red Team technical report<\/em><\/a><em>, the<\/em><a href=\"https:\/\/www.aisi.gov.uk\/blog\/our-evaluation-of-claude-mythos-previews-cyber-capabilities\" target=\"_blank\" rel=\"noopener\"><em> <\/em><em>UK AI Security Institute evaluation<\/em><\/a><em>, and reporting from<\/em><a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2026-04-10\/anthropic-model-scare-sparks-urgent-bessent-powell-warning-to-bank-ceos\" target=\"_blank\" rel=\"noopener\"><em> <\/em><em>Bloomberg<\/em><\/a><em>,<\/em><a href=\"https:\/\/www.cnbc.com\/2026\/04\/10\/powell-bessent-us-bank-ceos-anthropic-mythos-ai-cyber.html\" target=\"_blank\" rel=\"noopener\"><em> <\/em><em>CNBC<\/em><\/a><em>,<\/em><a href=\"https:\/\/fortune.com\/2026\/04\/10\/bessent-powell-anthropic-mythos-ai-model-cyber-risk\/\" target=\"_blank\" rel=\"noopener\"><em> <\/em><em>Fortune<\/em><\/a><em>, and<\/em><a href=\"https:\/\/www.nbcnews.com\/tech\/security\/anthropic-project-glasswing-mythos-preview-claude-gets-limited-release-rcna267234\" target=\"_blank\" rel=\"noopener\"><em> <\/em><em>NBC News<\/em><\/a><em>.<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>FAQ<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>What is Claude Mythos?<\/strong> Claude Mythos Preview is Anthropic&#8217;s latest frontier large language model, announced on April 7, 2026. It is the company&#8217;s most capable model to date, demonstrating generational leaps in coding, reasoning, and agentic tasks\u2014particularly in cybersecurity, where it can autonomously discover and exploit zero-day vulnerabilities across major software systems. Due to the offensive potential of these capabilities, Anthropic chose not to release it publicly, restricting access to select partners through Project Glasswing.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>How does Claude Mythos compare to Claude Opus 4.6?<\/strong> Mythos significantly outperforms Opus 4.6 across multiple benchmarks. On Firefox 147 exploit development, Opus 4.6 succeeded 2 times versus Mythos&#8217;s 181 times\u2014a 90x improvement. On cybersecurity vulnerability reproduction tasks, Mythos scored 83.1% versus 66.6% for Opus 4.6. On SWE-bench Pro, Mythos achieved 77.8% versus 53.4%. Mythos occupies a new model tier (codenamed Capybara) positioned above Opus.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Why won&#8217;t Anthropic release Claude Mythos to the public?<\/strong> Because Mythos can autonomously discover and exploit zero-day vulnerabilities in virtually all major operating systems and browsers, including chaining multiple vulnerabilities into complete attack sequences. If these capabilities were obtained by malicious actors, they could pose severe threats to global critical infrastructure. Anthropic decided to give defenders a head start by patching vulnerabilities through Project Glasswing before considering any broader release.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>What is Project Glasswing and which companies are involved?<\/strong> Project Glasswing is a defensive cybersecurity initiative launched by Anthropic to use Mythos for finding and fixing vulnerabilities in critical software before attackers develop comparable capabilities. The 12 launch partners include AWS, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorgan Chase, the Linux Foundation, Microsoft, NVIDIA, and Palo Alto Networks, with 40+ additional organizations also granted access. Anthropic committed $100 million in usage credits and $4 million in open-source security donations.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>What does the Claude Mythos API cost?<\/strong> Mythos Preview is priced at $25 per million input tokens and $125 per million output tokens. It is currently available only through the Project Glasswing program via the Claude API, Amazon Bedrock, Google Cloud Vertex AI, and Microsoft Foundry. General users cannot access it at this time.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>When will Claude Mythos be available to the general public?<\/strong> Anthropic has not announced a public release timeline. The company has stated it ultimately aims to enable users to safely deploy Mythos-class models at scale, but needs to develop adequate safeguards first. Leaked draft documents suggest a phased rollout via the Claude API, though the model remains costly to serve and is still being optimized for efficiency.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Is Mythos really as capable as Anthropic claims? Are there skeptics?<\/strong> Yes. Cybersecurity firm Aisle demonstrated that small open-source models could also detect some of the vulnerabilities Anthropic showcased, arguing that detection capabilities may not be as exclusive as claimed. Security researcher Bruce Schneier characterized the announcement as partly a PR play. However, most experts acknowledge that Mythos&#8217;s full chain of autonomous discovery, exploit generation, and multi-vulnerability chaining represents a genuinely unprecedented capability level.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>What should enterprises do in response to Mythos?<\/strong> The most immediate implication is that patching speed becomes critical. When AI can weaponize vulnerabilities within hours, monthly patch cycles are insufficient. Enterprises should strengthen foundational security practices (regular updates, access controls, comprehensive logging), enable auto-update mechanisms, and begin evaluating how to deploy AI for defensive security. For organizations building AI infrastructure, security must be embedded into every layer from hardware selection to containerized deployment.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Is Claude Mythos related to the earlier Claude Code source code leak?<\/strong> They are separate incidents but occurred in close succession. In late March 2026, Claude Code v2.1.88&#8217;s full source code was accidentally exposed via an npm packaging error, revealing 44 hidden features including the KAIROS autonomous agent mode. Approximately two weeks later, Mythos was officially announced. The back-to-back incidents created additional trust pressure on Anthropic, but also underscored the company&#8217;s position at the frontier of AI capabilities.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Claude Mythos Preview is Anthropic&#8217;s most capable frontier AI model, able to autonomously discover thousands of zero-day vulnerabilities\u2014yet the company refuses to release it publicly. A full breakdown of Mythos&#8217;s capabilities, Project Glasswing, the Wall Street emergency meeting, and what this AI cybersecurity revolution means for enterprises.<\/p>\n","protected":false},"author":253372376,"featured_media":12991,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[96987604,96987592],"tags":[96988522],"class_list":["post-12990","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-news","category-featured-articles","tag-mythos"],"blocksy_meta":[],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/ai-stack.ai\/wp-content\/uploads\/2026\/04\/%E6%A8%A1%E5%9E%8BA-37-057d969d.jpg?fit=1920%2C1080&quality=100&ct=202603031250&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/ph344V-3nw","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ai-stack.ai\/en\/wp-json\/wp\/v2\/posts\/12990","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ai-stack.ai\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ai-stack.ai\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ai-stack.ai\/en\/wp-json\/wp\/v2\/users\/253372376"}],"replies":[{"embeddable":true,"href":"https:\/\/ai-stack.ai\/en\/wp-json\/wp\/v2\/comments?post=12990"}],"version-history":[{"count":1,"href":"https:\/\/ai-stack.ai\/en\/wp-json\/wp\/v2\/posts\/12990\/revisions"}],"predecessor-version":[{"id":12995,"href":"https:\/\/ai-stack.ai\/en\/wp-json\/wp\/v2\/posts\/12990\/revisions\/12995"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ai-stack.ai\/en\/wp-json\/wp\/v2\/media\/12991"}],"wp:attachment":[{"href":"https:\/\/ai-stack.ai\/en\/wp-json\/wp\/v2\/media?parent=12990"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ai-stack.ai\/en\/wp-json\/wp\/v2\/categories?post=12990"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ai-stack.ai\/en\/wp-json\/wp\/v2\/tags?post=12990"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}