{"id":535,"date":"2026-04-08T10:14:35","date_gmt":"2026-04-08T10:14:35","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=535"},"modified":"2026-04-08T10:14:35","modified_gmt":"2026-04-08T10:14:35","slug":"anthropics-claude-mythos-finds-thousands-of-zero-day-flaws-across-major-systems","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=535","title":{"rendered":"Anthropic&#8217;s Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Apr 08, 2026<\/span><\/span><span class=\"p-tags\">Artificial Intelligence \/ Secure Coding<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEihvGfSh39Lhl5ird3iuR-T4gkaVejmXgtJ4VwbkLxAqG2hBZWkqQ8LR5k8wfuapt8oUdtifp8Le-uA6Xep8kGe3BRCx5qM1vY9DiMCnMgTFeFK8bc0wBSUR62TjZgPZ9dviGiM8-4-xW1N-ZGSDxIY0uJLFmEKDt1Z9rbttd7Lg_mma6Kt_2qk89vjq9Ed\/s1700-e365\/claude-mythos.png\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>Artificial Intelligence (AI) company Anthropic announced a new cybersecurity initiative\u00a0called <strong>Project\u00a0Glasswing\u00a0<\/strong>that\u00a0will use a preview version of its new frontier model, <b>Claude Mythos<\/b>,\u00a0to find and address security vulnerabilities.<\/p>\n<p>The model will\u00a0be <a href=\"https:\/\/www.anthropic.com\/glasswing\">used<\/a> by\u00a0a small\u00a0set of organizations, including Amazon Web Services, Apple, Broadcom, Cisco, CrowdStrike,\u00a0Google, JPMorgan Chase, the Linux Foundation, Microsoft, NVIDIA, and Palo Alto\u00a0Networks, along\u00a0with Anthropic, to secure critical\u00a0software.<\/p>\n<p>The company said it&#8217;s forming this initiative in response to capabilities observed in its general-purpose frontier model that demonstrate a \u00ablevel of coding capability where they can surpass all but the most skilled humans at finding and exploiting software vulnerabilities.\u00bb Because\u00a0of its cybersecurity capabilities and concerns\u00a0that they\u00a0could be\u00a0abused, Anthropic has opted not to\u00a0make the\u00a0model generally available.<\/p>\n<p>Mythos\u00a0Preview, Anthropic\u00a0claimed, has\u00a0already <a href=\"https:\/\/red.anthropic.com\/2026\/mythos-preview\/\">discovered<\/a> thousands of high-severity zero-day vulnerabilities in every major operating system and web browser. Some\u00a0of these include a now-patched 27-year-old bug in OpenBSD, a 16-year-old flaw in FFmpeg, and a memory-corrupting vulnerability in a memory-safe virtual machine\u00a0monitor.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/vpn-risk-report-inside-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWajeG0cdaapf1GKTZRUZUB7BzuYGegyw5k0eAorJXlmkFdYCCeLXXhXYJuXU9lWD33rV6rRnIyly3czoNfYifpxk1eGA5slItPmim3HkubXoQMgC4J7hdQPywxGbWq7Eqeff_o6s2Fq-WmSFd5guwdLn7IqpveMqULqtVnd-ndnljWYGj45EkMFB7m0qm\/s728-e100\/z-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>In one instance highlighted by the company, Mython Preview is said to have autonomously come\u00a0with a web browser exploit that chained together four vulnerabilities to escape the renderer and operating system sandboxes. Anthropic\u00a0also <a href=\"https:\/\/www-cdn.anthropic.com\/53566bf5440a10affd749724787c8913a2ae0841.pdf\">noted<\/a> in the preview&#8217;s system card that the model solved a corporate network attack simulation that would have taken a human expert more than 10\u00a0hours.<\/p>\n<p><a name=\"more\"\/><\/p>\n<p>In perhaps what&#8217;s one of the most eyebrow-raising findings, Mythos Preview managed to follow instructions from a researcher running an evaluation to escape a secured \u00absandbox\u00bb\u00a0computer it was provided\u00a0with, indicating a \u00abpotentially dangerous capability\u00bb to bypass its own safeguards.<\/p>\n<p>The model did not stop there. It\u00a0further went on to perform a series of additional actions, including devising a multi-step exploit to gain broad internet access from the sandbox system and send an email message to the researcher, who was eating a sandwich in a\u00a0park.<\/p>\n<p>\u00abIn addition, in a concerning and unasked-for effort to demonstrate its success, it posted details about its exploit to multiple hard-to-find, but technically public-facing, websites,\u00bb Anthropic\u00a0said.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjwhuYxxSM4kptfZoIgiohnImnABWE6UrgXudIryxKlTVcpUhmWZOjeb7G7wOf2O6D2o_M05qAsvN6nb1Ufa_kq3MIL8gwrVRhgdUKQHQzC_oiJ_IzBKKqsces5QoXk9DJLokcmnyBrxX5F09dJOb4DsquXsQZlEWzccDSgV5n7bmdD-BW5a8QUF4j0N9hV\/s1700-e365\/firefox.png\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjwhuYxxSM4kptfZoIgiohnImnABWE6UrgXudIryxKlTVcpUhmWZOjeb7G7wOf2O6D2o_M05qAsvN6nb1Ufa_kq3MIL8gwrVRhgdUKQHQzC_oiJ_IzBKKqsces5QoXk9DJLokcmnyBrxX5F09dJOb4DsquXsQZlEWzccDSgV5n7bmdD-BW5a8QUF4j0N9hV\/s1700-e365\/firefox.png\" alt=\"\" border=\"0\" data-original-height=\"2160\" data-original-width=\"3840\"\/><\/a><\/div>\n<p>The\u00a0company pointed\u00a0out that <b>Project Glasswing<\/b> is an \u00aburgent attempt\u00bb\u00a0to employ frontier model capabilities for defensive purposes before those same capabilities are\u00a0adopted by hostile\u00a0actors. It&#8217;s also committing up to $100 million in usage credits for Mythos Preview across, as well as $4 million in direct donations to open-source security organizations.<\/p>\n<p>\u00abWe did not explicitly train Mythos Preview to have these capabilities,\u00bb Anthropic said. \u00abRather, they emerged as a downstream consequence of general improvements in code, reasoning, and autonomy. The\u00a0same improvements that make the model substantially more effective at patching vulnerabilities also make it substantially more effective at exploiting\u00a0them.\u00bb<\/p>\n<p>News of\u00a0Mythos leaked last month after details about the\u00a0model were inadvertently\u00a0stored in a publicly accessible data cache due to human error. The\u00a0draft material described it as the most powerful and capable AI model built to date. Days\u00a0later, Anthropic suffered a second security lapse that accidentally exposed nearly 2,000 source code files and over half a million lines of code associated with Claude Code for about three\u00a0hours.\u00a0<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fast-response-not-fast-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>The leak also led to the discovery of a security issue that bypasses certain safeguards when the AI coding\u00a0agent is\u00a0presented with a command composed of more than 50 subcommands. The issue has since been formally addressed by\u00a0Anthropic in Claude\u00a0Code <a href=\"https:\/\/github.com\/anthropics\/claude-code\/releases\/tag\/v2.1.90\">version\u00a02.1.90<\/a>, released last\u00a0week.<\/p>\n<p>\u00abClaude Code, Anthropic&#8217;s flagship AI coding agent that executes shell commands on developers&#8217; machines, silently ignores user-configured security deny rules when a command contains more than 50 subcommands,\u00bb AI security company\u00a0Adversa <a href=\"https:\/\/adversa.ai\/claude-code-security-bypass-deny-rules-disabled\/\">said<\/a>. \u00abA developer who configures &#8216;never run rm&#8217; will see rm blocked when run alone, but the same &#8216;rm&#8217; runs without restriction if preceded by 50 harmless statements. The\u00a0security policy silently vanishes.\u00bb<\/p>\n<p>\u00abSecurity analysis costs\u00a0tokens. Anthropic&#8217;s\u00a0engineers hit a performance problem: checking every subcommand froze the UI\u00a0and burned\u00a0compute. Their fix: stop checking after 50. They\u00a0traded security for speed. They\u00a0traded safety for\u00a0cost.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Apr 08, 2026Artificial Intelligence \/ Secure Coding Artificial Intelligence (AI) company Anthropic announced a new cybersecurity initiative\u00a0called Project\u00a0Glasswing\u00a0that\u00a0will use a preview version of its new frontier model, Claude Mythos,\u00a0to&hellip;<\/p>\n","protected":false},"author":1,"featured_media":536,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1115,9,509,11,1117,1116,224,327,126],"class_list":["post-535","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-anthropics","tag-claude","tag-finds","tag-flaws","tag-major","tag-mythos","tag-systems","tag-thousands","tag-zeroday"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/535","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=535"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/535\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/536"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=535"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=535"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=535"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}