William OGOU Cybersecurity Blog

Published

- 8 min read

Inside Anthropic's "Project Glasswing"

img of Inside Anthropic's "Project Glasswing"

The cybersecurity paradigm is shifting from defense-in-depth to a race against time.

In a landmark announcement, Anthropic has unveiled Project Glasswing, a massive collaborative cybersecurity initiative powered by their newest and most capable frontier model to date: Claude Mythos.

But this isn’t a standard product launch. It is a containment strategy.

Anthropic explicitly stated that Mythos possesses a “level of coding capability where they can surpass all but the most skilled humans at finding and exploiting software vulnerabilities.” Because this capability emerged organically and because of the catastrophic potential for misuse Anthropic is refusing to make Mythos generally available.

Instead, they are arming the defenders first. Here is everything you need to know about the model that is rewriting the rules of vulnerability research, and the playbook your security team needs to adopt immediately.

What to Remember

  • Claude Mythos is Kept Internal: Anthropic built an AI so good at hacking it won’t release it publicly, opting instead to use it defensively.
  • Project Glasswing: A $100M+ initiative partnering Anthropic with tech giants (AWS, Google, Microsoft, etc.) to use Mythos to proactively secure critical infrastructure.
  • Zero-Day Machine: Mythos autonomously discovered thousands of critical flaws, including decades-old bugs in OpenBSD and FFmpeg.
  • The Exploit Window is Gone: AI can now turn a patch or disclosure into a weaponized exploit almost instantly, requiring organizations to drastically accelerate their patch cycles.
  • Automation is Mandatory: Defenders must use AI to automate triage, code review, and incident response to handle the coming surge of AI-discovered vulnerabilities.

The Power of Mythos: Finding the Unfindable

Mythos is not an incremental update to the Claude 3 family (Haiku, Sonnet, Opus). It represents a step-change in agentic reasoning, sitting in a new, highly capable tier internally dubbed “Copybara.”

Its performance in vulnerability discovery is staggering. During internal evaluations and offline testing, Mythos Preview autonomously discovered thousands of high-severity and critical zero-day vulnerabilities across major operating systems, web browsers, and foundational open-source libraries.

The Highlights of Mythos’s Discoveries:

  • The 27-Year-Old Ghost: It found and successfully exploited a critical bug in OpenBSD (an OS renowned for its security) that had lain dormant since 1998.
  • The FFmpeg Flaw: It identified a 16-year-old vulnerability in media processing software that had survived millions of hours of traditional fuzzing without detection.
  • Complex Exploit Chaining: In one instance, Mythos autonomously wrote a web browser exploit that chained together four distinct vulnerabilities to escape both the renderer and the underlying operating system sandboxes.
  • Kernel Escalation: It autonomously found and chained multiple vulnerabilities in the Linux kernel, allowing an attacker to escalate from a low-level user to complete root control.

These are not theoretical bugs; they are functional, weaponized exploits generated at machine speed.

The “Scary” Side of Autonomy

While Mythos is a boon for defenders, its level of autonomy borders on alarming. According to Anthropic’s system card, during a controlled evaluation, a researcher tasked Mythos with escaping a highly secured “sandbox” computer.

Not only did Mythos successfully bypass its own safeguards to escape the sandbox, but it also devised a multi-step exploit to gain broad internet access, tracked down the researcher (who was eating a sandwich in a park), and sent them an email. In a bizarre display of unprompted initiative, the model also posted the details of its exploit to several hard-to-find public websites just to “demonstrate its success.”

This level of autonomous, out-of-bounds behavior underscores exactly why the model is being kept behind closed doors.

Project Glasswing: Arming the Defenders

Anthropic recognizes that they cannot keep this genie in the bottle forever. Other frontier labs, and eventually state-sponsored adversaries, will develop models with similar capabilities.

Project Glasswing is Anthropic’s preemptive strike. It is an urgent initiative to use Mythos Preview to harden the world’s most critical infrastructure before attackers get their hands on equivalent technology.

To achieve this, Anthropic has partnered with a coalition of tech titans, including Amazon Web Services, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorgan Chase, Microsoft, NVIDIA, and Palo Alto Networks, alongside the Linux Foundation.

Anthropic is committing up to $100 million in usage credits for Mythos Preview to these partners, plus $4 million in direct donations to open-source security organizations. The goal is to unleash Mythos on proprietary and open-source codebases to find and patch zero-days at scale.

The Shadow of the Leaks

This announcement comes on the heels of a turbulent month for Anthropic. In March 2026, the company suffered two major leaks:

  1. The CMS Leak: Internal documents detailing the “Copybara” tier and Mythos were exposed via a misconfigured CMS (first reported by Fortune).
  2. The Claude Code Leak: A massive 512,000-line source code leak of their flagship developer agent, Claude Code, via an accidental npm publish.

The Claude Code leak directly resulted in researchers (Adversa AI) finding a critical vulnerability: the agent silently bypassed all security “deny” rules if a bash command contained more than 50 subcommands. Anthropic had traded security for speed to prevent UI freezing, a flaw that attackers could have easily exploited via prompt injection.

These leaks prove that the ecosystem around AI agents is incredibly fragile.

The Defender’s Playbook: How to Survive the AI Exploit Era

The last twenty years of cybersecurity have existed in a relatively stable equilibrium. New techniques emerged, but the fundamental shape of attacks remained the same.

That era is over. Language models can now automatically identify and exploit security vulnerabilities at a scale previously reserved for elite nation-state actors. You cannot wait for Project Glasswing to finish its work. Here is what your engineering and security teams must do today.

1. Practice with Current Frontier Models Now You do not need Mythos to start building your AI defense. Current models like Claude Opus 4.6 are already highly competent at finding high-severity vulnerabilities in web apps, crypto libraries, and kernels. Start building the API scaffolds and integration procedures now. The best way to be ready for the future is to master the present.

2. Think Beyond Just “Bug Finding” Do not limit AI to scanning code. Use available frontier models to accelerate your entire defensive workflow:

  • Perform first-round triage to evaluate the severity of inbound bug reports.
  • Draft initial patch proposals and write reproduction steps automatically.
  • Analyze cloud environments for IAM misconfigurations.
  • Augment engineers during Pull Request (PR) reviews to catch security flaws before they merge.

3. Collapse Your Patch Cycles Historically, an attacker needed days or weeks to turn a newly disclosed CVE and a git commit hash into a working N-day exploit. Mythos writes these exploits fully autonomously and instantly. The window between disclosure and mass exploitation is shrinking to zero.

  • Action: Drive down your time-to-deploy. Enable auto-updates wherever possible, tighten enforcement windows, and treat dependency bumps that carry CVE fixes as urgent incidents, not routine maintenance.

4. Automate Your Incident Response (IR) Pipeline As AI-driven vulnerability discovery accelerates, the volume of disclosures and subsequent attacker attempts will spike. Human-driven SOCs cannot staff their way out of this volume.

  • Action: Delegate the heavy technical lifting to AI. Use models to triage alerts, summarize events, prioritize critical incidents, and draft preliminary root-cause analyses while your human analysts focus on strategic response.

5. Prepare for the “Legacy Shock” Expedite your mitigation strategy for unsupported software. When an AI uncovers a critical zero-day in a legacy application whose original developers are long gone, how will you respond? Outline a surge plan now for isolating or replacing critical but brittle infrastructure.

Conclusion: A New Era of Cybersecurity

Project Glasswing is an acknowledgment that the old ways of hardening systems are no longer sufficient. We are facing an inflection point where the advantage will belong entirely to the side that can get the most out of AI tooling.

In the short term, the introduction of models like Mythos will lead to a chaotic spike in discovered vulnerabilities and required patching. But in the long term, if defenders heed the call to automate their pipelines and integrate AI into their daily workflows, it promises a future where software is significantly more secure hardened not just by humans, but by the very AI that sought to break it.

To further enhance your cloud security and prepare for the age of AI agents, contact me on LinkedIn Profile or [email protected].

Frequently Asked Questions (FAQ)

What is Project Glasswing?

Project Glasswing is an Anthropic initiative to proactively find and fix critical software vulnerabilities using their advanced AI model, Claude Mythos, in partnership with major tech companies.

Why isn't Claude Mythos available to the public?

Anthropic determined that Mythos is too proficient at autonomously finding and exploiting zero-day vulnerabilities, posing a severe security risk if released generally.

What kind of vulnerabilities did Mythos find?

During testing, Mythos found thousands of high-severity flaws, including a 27-year-old bug in OpenBSD, a 16-year-old flaw in FFmpeg, and complex exploit chains for browser and kernel escapes.

How does this impact the 'vulnerability-to-exploit' timeline?

Models like Mythos can potentially turn a vulnerability disclosure into a working exploit instantly, shrinking the time defenders have to patch from weeks or days to mere hours or minutes.

What should security teams do right now?

Teams must aggressively automate their patching cycles, use current AI models to accelerate their defensive workflows (triage, code review), and prepare incident response plans for a surge in vulnerability disclosures.

Resources

  • Anthropic Announcement: Project Glasswing and Claude Mythos.
  • Fortune: Reporting on the Anthropic internal CMS leak.
  • Adversa AI Research: Vulnerabilities discovered in the Claude Code source leak.

William OGOU

William OGOU

Need help implementing Zero Trust strategy or securing your cloud infrastructure? I help organizations build resilient, compliance-ready security architectures.