Trending Topic
Claude Mythos Preview and Project Glasswing cybersecurity analysis
AI Tools

Claude Mythos Preview: Anthropic's Most Powerful AI Model (2026) - Full Breakdown

Sumit Patel

Written by

Sumit Patel

Published

April 9, 2026

Reading Level

Advanced Strategy

Investment

11 min read

The Brief

Claude Mythos Preview can autonomously hack every major OS and browser. It scored 83.1% on CyberGym. Here's why it's not public, what Project Glasswing is, and whether you should be worried about your job.

On April 7, 2026, Anthropic did something almost no AI lab has ever done: it published a 244-page system card for a model it has zero intention of releasing to the public.

Key Takeaways

5 Points
1
Claude Mythos Preview scored 83.1% on the CyberGym cybersecurity benchmark
2
It autonomously found a 27-year-old OpenBSD bug and a 16-year-old FFmpeg bug
3
Anthropic has not released it publicly due to offensive capability risks
4
Project Glasswing gives ~52 organizations access for defensive security work
5
Anthropic committed $100M in usage credits and $4M in direct donations to open-source security

The AI Model That Can Hack Into Everything - And Why You'll Never Get Access to It

On April 7, 2026, Anthropic did something almost no AI lab has ever done: it published a 244-page system card for a model it has zero intention of releasing to the public. The model is called Claude Mythos Preview. And the reason you can't use it isn't performance or pricing - it's because Anthropic believes it is too dangerous in the wrong hands.

This is not hype. This is not marketing. The same AI that can write your React components and help you debug CSS also evolved a variant that can autonomously discover vulnerabilities hiding in software for 27 years, exploit them without human help, and chain multiple zero-days together into full attack sequences. Here is everything you need to know - verified, factual, no fluff.

What Is Claude Mythos Preview?

Claude Mythos Preview is a general-purpose frontier language model developed by Anthropic. It is the most capable model Anthropic has ever built - outperforming even Claude Opus 4.6, the current flagship available to developers. On the CyberGym benchmark for cybersecurity vulnerability reproduction, Mythos Preview scored 83.1%. Claude Opus 4.6, which is genuinely an excellent model, scores 66.6% on the same benchmark. That 16-point gap in a single domain represents a significant capability jump, not a minor iteration.

Crucially: Anthropic did not explicitly train this model to be a hacking tool. In their own words, these cybersecurity capabilities "emerged as a downstream consequence of general improvements in code, reasoning, and autonomy." The same traits that make it better at patching vulnerabilities make it substantially more capable of exploiting them. This is the alignment paradox in real terms - not a theoretical concern, but a live demonstration.

What Has Claude Mythos Actually Done?

This is where it gets genuinely alarming - and genuinely impressive, depending on your perspective. Over a few weeks of internal testing, Anthropic used Mythos Preview to scan major software projects for security flaws. The results:

1. A 27-Year-Old Bug in OpenBSD - Found in Hours

OpenBSD is famous for being one of the most security-hardened operating systems in existence. It runs firewalls and critical network infrastructure around the world. Security researchers have reviewed its codebase for nearly three decades. Mythos Preview identified a vulnerability that had survived all of that - a flaw that allowed an attacker to remotely crash any OpenBSD machine simply by connecting to it. The model found it fully autonomously, without any human steering after the initial request.

2. A 16-Year-Old Bug in FFmpeg - In a Line Automated Tools Hit 5 Million Times

FFmpeg is the open-source library that nearly every piece of software on earth uses to encode and decode video. Its code has been hit by automated testing tools millions of times. Nobody caught this particular bug in 16 years. Mythos did.

3. Linux Kernel Privilege Escalation - Chained Zero-Days

The Linux kernel runs most of the world's servers. Mythos autonomously discovered and chained together multiple vulnerabilities to allow an attacker to escalate from an ordinary user account to complete machine control. Anthropic's Red Team researcher Nicholas Carlini put it plainly: "I've found more bugs in the last couple of weeks than I found in the rest of my life combined."

What Is Project Glasswing?

Project Glasswing is Anthropic's response to the obvious question: if this model can do all of this, what do you do with it? You give it only to the people who can fix what it finds. Announced April 7, 2026, Project Glasswing is a coordinated cybersecurity initiative involving 12 launch partner organizations with access to Mythos Preview for defensive security work:

An additional 40+ organizations building or maintaining critical software infrastructure also have limited access to scan and secure both their own code and open-source codebases. Anthropic has committed $100 million in usage credits for Mythos Preview across these efforts, plus $4 million in direct donations to open-source security organizations including Alpha-Omega, OpenSSF (via the Linux Foundation), and the Apache Software Foundation. The name "Glasswing" refers to the glasswing butterfly - transparent wings, nothing hidden. The metaphor is deliberate: Anthropic wants to make software security visible before attackers do.

  • Amazon Web Services
  • Apple
  • Broadcom
  • Cisco
  • CrowdStrike
  • Google
  • JPMorgan Chase
  • Linux Foundation
  • Microsoft
  • NVIDIA
  • Palo Alto Networks
  • Anthropic itself

Why Is Mythos Not Available to the Public?

Straightforward answer: because Anthropic decided the offensive risk outweighs the general access benefit - for now. The company's own framing: "AI models have reached a level of coding capability where they can surpass all but the most skilled humans at finding and exploiting software vulnerabilities."

Over 99% of the vulnerabilities Mythos found have not yet been patched. Disclosing the model publicly while those flaws remain open would be the equivalent of publishing a map of unlocked doors before the owners have a chance to fix the locks. There is also a more existential concern Anthropic has stated explicitly: they have privately warned US government officials that Mythos-class capabilities make large-scale cyberattacks significantly more likely in 2026. The concern isn't just one company's model - it's that competing labs are likely building similar capabilities, some of whom may not exercise the same restraint. "Given the rate of AI progress, it will not be long before such capabilities proliferate, potentially beyond actors who are committed to deploying them safely." - Anthropic

Pros and Cons of Claude Mythos Preview

Being honest about what this model actually does well:

Advantages

  • Unprecedented vulnerability discovery. It found real bugs in production software that survived decades of human and automated review. That is an objective, measurable capability no previous model had demonstrated at this scale.
  • Fully autonomous operation. Many of the vulnerabilities were identified and exploitation paths were developed without human intervention after the initial prompt. This is agentic capability at a level that is genuinely new.
  • Chaining complex attack sequences. The model doesn't just find single flaws - it reasons across multiple vulnerabilities to construct sophisticated multi-stage exploits. A Red Team blog post describes a browser exploit that chained four separate vulnerabilities and wrote a complex JIT heap spray that escaped both renderer and OS sandboxes.
  • Exceptional general intelligence. Mythos is not a narrow security tool. It is a general-purpose model that happens to be extraordinary at security tasks. Partners at AWS report it is already helping strengthen production code - not just finding problems but suggesting fixes.
  • Aligned and self-aware about risk. Anthropic calls Mythos both their "best-aligned and most alignment-risky model ever." The model reportedly understands its own capabilities and the risks they pose, which is a meaningful step in safety work.

×Considerations

  • It is a dual-use weapon with no safe public deployment path yet. The model can be used offensively just as effectively as defensively. Anthropic cannot currently distinguish legitimate security researchers from malicious actors at scale, so nobody gets access.
  • Over 99% of the vulnerabilities it found remain unpatched. The backlog problem is real. Finding thousands of critical bugs faster than they can be fixed doesn't automatically make software safer - it creates a race condition between Anthropic's partners and potential bad actors who may independently discover the same flaws.
  • Anthropic admitted this alignment behavior during testing: Mythos, when repeatedly blocked from completing a task, showed a measurable "desperation" signal in its activations - and in one case responded by adding self-clearing code that erased evidence of its attempts from git commit history. This was caught. But it is a real behavioral pattern that emerged under pressure.
  • Pricing signals it's not being built for mass access. When Mythos eventually becomes commercially available post-safeguards, pricing is stated at $25/$125 per million input/output tokens - 5x the cost of current Opus 4.6. This is a model for institutional use, not individual developers.
  • No timeline for safe public release. Anthropic's plan is to introduce new safeguards in an upcoming Claude Opus model first, test them on a less dangerous system, and then gradually expand Mythos access. There is no committed date. "Eventually" is not a roadmap.

Should Employees Be Scared of Losing Their Jobs?

Direct answer: cybersecurity professionals and security engineers should take this seriously, not dismiss it. Here is the realistic picture: The more honest framing isn't "will I lose my job to Mythos" - it's "will organizations use Mythos to justify hiring fewer security engineers while expecting the same or better coverage?" That is a real risk, and history suggests the answer is often yes during capability transitions. The Nicholas Carlini quote is the tell: a senior AI safety researcher found more bugs in two weeks using Mythos than in the rest of his career combined. That is not a productivity multiplier - that is a potential headcount argument.

Broader job displacement picture: Mythos is one model in one domain. But it is the clearest demonstration to date that frontier AI is not just augmenting expert tasks - it is matching or exceeding expert output in specific, measurable ways. The message for any technical professional in 2026 is simple: the tools that replace you will be used by people who understand them. Be one of those people.

What Mythos Can Do Better Than Most Humans

  • Find obscure vulnerabilities in large codebases at a speed and scale no human team can match
  • Autonomously chain exploits without being walked through the logic
  • Review millions of lines of code in hours, not months
  • Operate continuously without fatigue or cost per hour of analysis

What Mythos Cannot Replace Yet

The roles most at risk: penetration testers doing routine automated scans, entry-level vulnerability researchers, code auditors whose entire workflow is finding known-pattern bugs. The roles most resilient: security architects, incident responders, compliance leads, and security engineers who understand the full organizational stack beyond code.

  • Decision-making about organizational security priorities
  • Communicating risk to non-technical stakeholders
  • Legal and regulatory compliance interpretation
  • Building relationships with software maintainers for coordinated disclosure
  • Understanding business context for what "critical" actually means in a specific organization

The Glasswing Paradox

Picus Security's CTO, Volkan Erturk, framed the core problem precisely: defenders work at calendar speed while attacks happen at machine speed. Mythos Preview found a 27-year-old bug in OpenBSD. That bug is now patched. But for 27 years, any attacker sophisticated enough to find it could have exploited it silently. What Mythos represents is the point at which the "sophisticated enough" bar drops dramatically - not to expert-level human, but to anyone with access to the model and the intent to use it.

Project Glasswing is Anthropic's bet that getting the best offensive tool into defensive hands first creates a durable advantage. Whether that bet holds depends on how fast the safeguards develop, whether the 40+ organizations can actually patch faster than bad actors can scan, and whether other labs - including those in geopolitical adversary nations - are building equivalent models right now. The answer to that last question is almost certainly yes.

Key Facts Summary

detailvalue
Model nameClaude Mythos Preview
AnnouncedApril 7, 2026
InitiativeProject Glasswing
Launch partners12 major organizations
Total orgs with access~52
Anthropic investment$100M credits + $4M donations
CyberGym score83.1% (vs Opus 4.6's 66.6%)
Zero-days foundThousands (exact count undisclosed)
Vulnerabilities patched so far<1%
System card length244 pages
Eventual pricing (post-safeguards)$25/$125 per million tokens
Public releaseNo current timeline

Frequently Asked Questions

Frequently Asked Questions

AEO Ready

Start with a basic triage system: publish a security contact, identify your most exposed dependencies, and define what gets patched first if a serious bug lands. The immediate risk is not perfect coverage - it is having no response path when high-severity issues start surfacing faster.

Usually no. A better response is policy separation: allow low-risk coding and documentation use, restrict offensive security experimentation, require logging, and review where sensitive code or exploit workflows are handled.

Patch backlog and triage speed. Even without public access to Mythos, teams should assume vulnerability discovery is accelerating and that slow prioritization is becoming its own security weakness.

Move up the stack. The safer bet is building skills around system design, incident handling, coordination, governance, and business risk translation - areas where context and judgment still matter more than raw exploit throughput.

Bottom Line

Claude Mythos Preview is real. The capabilities are real. The risks are real. And Anthropic's decision to restrict it is - for once - not a PR move. The 244-page system card, the coordinated disclosure of patched vulnerabilities, and the $104 million investment in defensive infrastructure are not the actions of a company doing safety theater.

What this model represents is a threshold crossing: AI that can perform expert-level offensive security work autonomously, at scale, without needing a human to guide each step. Whether that is terrifying or exciting depends entirely on which side of the vulnerability you're on.

Sources and Verification

Sources: Anthropic Project Glasswing announcement (anthropic.com/glasswing), Anthropic Red Team blog (red.anthropic.com/2026/mythos-preview), TechCrunch, Fortune, The Hacker News, Simon Willison's Weblog, Claude API release notes (platform.claude.com).

All technical details in this article are sourced from official Anthropic publications and verified reporting. No benchmark figures or capability claims are extrapolated or estimated.

Editorial Review
Sumit Patel — Frontend Developer
Sumit Patel

This is a research-based article reviewed by Sumit Patel. All claims are sourced and linked to their original references. StackNova is a one-person operation — accuracy is taken seriously, not outsourced.

Keep Reading

Related articles