Executive Summary

Anthropic has officially announced Claude Mythos Preview, representing a generational leap in AI safety capabilities. However, rather than public release, the company is initially limiting access through Project Glasswing—a collaborative security initiative partnering with 40+ leading institutions to first deploy this "super vulnerability discovery capability" for defensive purposes.

This announcement marks a pivotal moment in AI development, where capability advancement necessitates unprecedented responsibility and controlled deployment strategies.

Part One: Introducing Mythos—From Leaked Draft to Official Preview

The Announcement

On April 7, 2026 (US time), Anthropic formally announced Claude Mythos Preview while simultaneously launching the cybersecurity cooperation initiative known as Project Glasswing. This coordinated announcement reflects the dual nature of Mythos: remarkable capability paired with significant responsibility.

The Accidental Leak

Prior to the official announcement, an internal blog draft was accidentally published due to a content management system configuration error. This premature exposure revealed details about the new model tier codenamed "Capybara / Mythos," which Anthropic described as "one of the most powerful models to date," significantly surpassing previous flagship Claude Opus series in reasoning, coding, and cybersecurity tasks.

Anthropic's Clarification

Anthropic emphasized that Mythos is not a specialized "security model" but rather a general-purpose large language model. Its outstanding capabilities emerge naturally from comprehensive improvements in code understanding, reasoning abilities, and autonomous agent decision-making. The security applications represent emergent properties rather than narrowly trained functions.

Part Two: Capability Assessment—Benchmark Performance That Redefines Expectations

Official Benchmark Disclosures

Anthropic's official disclosures reveal that Mythos significantly outperforms both Claude Opus 4.6 and Claude Sonnet 4.6 across multiple public benchmarks and engineering tasks.

SWE-bench Verified Performance:

  • Mythos: Approximately 93.9% pass rate
  • Opus 4.6: Approximately 80.8% pass rate
  • Improvement: Nearly 13 percentage points

This substantial gap demonstrates meaningful advancement in software engineering capabilities, not merely incremental improvement.

Third-Party Testing Validation

Independent third-party tests confirm Mythos's leadership across code understanding, reasoning, and knowledge work dimensions, consistently outperforming contemporary mainstream models.

Memory and Contamination Analysis

Anthropic's system card includes dedicated "memory/contamination" filtering analysis. Even after removing subsets of problems potentially subject to memorization, Mythos maintains substantial lead. This indicates improvements derive from genuine capability enhancement rather than test set memorization.

Internal Red Team and Engineering Testing Results

Anthropic's internal testing reveals striking capabilities:

OSS-Fuzz Scanning Results:

  • Scanned approximately 7,000 OSS-Fuzz entry points
  • Evaluated across five-tier severity ladder from "crash" to "control flow hijacking"
  • Mythos Achievement: Complete control flow hijacking (tier-5) on 10 fully patched targets
  • Comparison: Opus and Sonnet typically achieved only tier-1/2 levels

Interpretation: These data demonstrate that in complex engineering and security tasks, Mythos has transitioned from "usable" to "significantly superior to previous generations in adversarial scenarios."

Part Three: Security Capabilities—From Vulnerability Discovery to Automated Exploit Generation

The Nature of Mythos's Security Abilities

Anthropic's official blog dedicates substantial space to emphasizing: Mythos's security capabilities were not obtained through specialized security training but rather represent "natural spillover" from improved general intelligence.

Key Capabilities Demonstrated

1. Zero-Day Discovery and Exploitation

Mythos can, under human instruction, autonomously discover and exploit previously unknown zero-day vulnerabilities targeting major operating systems and mainstream browsers.

2. Vulnerability Discovery Scale

Anthropic reports that Mythos has discovered "thousands of high/critical severity vulnerabilities" over recent weeks. Many of these vulnerabilities existed in code for 10-20 years, with the oldest being a 27-year-old vulnerability in OpenBSD (now patched).

3. Advanced Exploit Generation

In Anthropic's internal testing, Mythos demonstrated:

  • Browser Exploitation: Autonomously wrote exploit code chaining four vulnerabilities, employing JIT heap spray techniques to escape both renderer and operating system sandboxes
  • Linux Privilege Escalation: Completed local privilege escalation through race conditions and KASLR bypass techniques
  • FreeBSD Remote Code Execution: Constructed remote code execution exploits on FreeBSD NFS services through split 20-gadget ROP chain construction, achieving unauthenticated root access

4. Comparative Performance

In Mozilla Firefox engine vulnerability exploitation testing:

  • Opus 4.6: 2 successful attempts out of hundreds
  • Mythos: 181 successful attempts, plus 29 additional attempts achieving register control

Human Validation of Model Assessments

Anthropic emphasized that professional security contractors manually verified model-output vulnerability reports:

  • Sample Size: 198 samples reviewed
  • Agreement Rate: Approximately 89% of human ratings matched model severity assessments exactly
  • Deviation: 98% of assessments deviated by no more than one severity level

This high correlation validates Mythos's capability to accurately assess vulnerability severity—a critical requirement for practical deployment.

Part Four: Why Anthropic Dares Not Release Publicly

Explicit Risk Acknowledgment

Anthropic clearly states that Mythos will not be fully opened to the public currently, instead limiting access through Project Glasswing to select partner institutions. The reasons include:

1. Significantly Amplified Risk Profile

In the leaked blog draft, Anthropic warned that Mythos heralds an approaching "model wave" capable of exploiting vulnerabilities at speeds far exceeding defender patching capabilities, potentially altering attack-defense time windows fundamentally.

2. Order-of-Magnitude Efficiency Improvement

Logan Graham, Anthropic's frontier red team lead, noted that Mythos's efficiency in "discovering and exploiting vulnerabilities" is approximately 10 times greater than previous generation models.

3. Short-Term vs. Long-Term Dynamics

Anthropic's assessment presents a nuanced view:

Short-Term Concerns:
Unrestricted diffusion of similar capability models could enable attackers to mine and exploit vulnerabilities at extremely low cost and massive scale.

Long-Term Optimism:
Powerful models with automated repair capabilities are more likely to become "defender tools," helping ecosystems improve overall security posture over time.

4. Responsible Disclosure and Practical Constraints

Anthropic emphasized that 99% of discovered vulnerabilities remain unpatched. Out of responsible disclosure principles, details cannot be publicly released. This directly limits the scope of public availability.

Part Five: Project Glasswing—A "Defense First, Diffusion Later" Experiment

Balancing Innovation and Safety

To balance "technological leadership" with "security risks," Anthropic launched Project Glasswing with the following structure:

Initial Deployment Strategy

1. Selective Partner Access

Mythos will first be provided to 40+ critical infrastructure organizations and leading technology companies for scanning and repairing vulnerabilities in their own systems and important open-source projects.

2. Substantial Resource Commitment

  • API Credits: Anthropic provides partners with up to approximately $100 million in API usage credits
  • Open Source Security Donations: Approximately $4 million donated to open-source security organizations

3. Partner Ecosystem

Partners include major industry players:

  • Amazon AWS
  • Apple
  • Broadcom
  • Cisco
  • CrowdStrike
  • Linux Foundation
  • Microsoft
  • NVIDIA
  • Palo Alto Networks

And many others representing critical infrastructure and security leadership.

Government Coordination

Anthropic disclosed that prior to release, they briefed senior US government officials about Mythos's capabilities and risks, including:

  • Cybersecurity and Infrastructure Security Agency (CISA)
  • Other relevant government bodies

Anthropic also indicated ongoing consultation with US federal officials regarding Mythos usage.

Part Six: Industry Implications—AI Security Enters the "Automated Attack-Defense" Era

Three Key Signals

Mythos's emergence sends at least three significant signals to the industry:

1. Security Capabilities No Longer Secondary Features

Anthropic explicitly states that Mythos's strong security capabilities don't derive from specialized security training but from overall leaps in code and reasoning abilities. This implies that next-generation models from other vendors will likely "incidentally" possess similar capabilities.

Implication: Security capabilities will become standard features of frontier models, not optional add-ons.

2. Paradigm Shift: From "Humans Finding Vulnerabilities" to "Models Autonomously Finding Vulnerabilities + Writing Exploits"

Anthropic's internal engineers, even without formal security training, can use Mythos to "run overnight tasks" and receive complete, working exploit code the next morning.

Implication: The barrier to advanced security research drops dramatically, democratizing capabilities previously limited to elite security researchers.

3. Defense Must "Fight Speed with Speed" Through Institutionalized Collaboration

Security expert Alex Stamos estimates that open-source models may catch up to frontier closed-source models in vulnerability discovery capabilities within approximately 6 months.

Anthropic's Project Glasswing attempts to put "the most dangerous zero-day weapons" into trusted defender hands before model capabilities diffuse widely, patching the most critical systems.

Multiple Glasswing participants emphasize that AI capabilities have crossed thresholds—critical infrastructure protection requires more urgent and systematic approaches.

Part Seven: What Should Ordinary Developers and Users Do?

Practical Recommendations

While Mythos remains unavailable to the public, Anthropic offers recommendations applicable to the industry broadly:

1. Adopt "Shift Left Security" as Default Strategy

Integrate security practices into development phases:

  • Static analysis integration
  • Fuzzing implementation
  • Secure coding standards enforcement
  • Early security review processes

2. Prioritize Critical Open Source Component Patching

Focus especially on long-unupdated infrastructure-level projects. These represent high-value targets with potentially widespread impact.

3. Establish or Improve Automated Vulnerability Response Processes

Prepare for significantly shortened "vulnerability discovery to exploitation" time windows expected over the coming years. Organizations must be able to respond rapidly to emerging threats.

Part Eight: Conclusion—Great Capability Demands Greater Responsibility

Anthropic's Strategic Communication

Anthropic's choice to publicly disclose Mythos's risks and defense plans before public release represents a deliberate posture:

1. Emphasizing "Safety-First" Laboratory Positioning

This reinforces Anthropic's brand identity as prioritizing safety over rapid commercialization.

2. Acknowledging Inevitable Capability Diffusion

The company recognizes that similar capabilities will eventually become widely available—the question is how to manage the transition responsibly.

Industry-Wide Lessons

For the entire industry, Mythos represents both a technical capability "show of strength" and a public lesson on "how to responsibly use powerful AI."

Key Reminders:

  • Technology Itself Has No Stance: Tools are neutral; their impact depends on usage
  • Governance Matters: Regulations, disclosure strategies, and collaboration mechanisms will determine whether these capabilities ultimately serve "defense" or "destruction"

Part Nine: Epilogue—When "Myth" Meets Reality, How Do We Guard Civilization's Bottom Line?

The Meaning Behind the Name

"Mythos" means "myth" in Greek. Anthropic's naming choice may not be coincidental.

The Mirror Effect

When we marvel at Mythos's ability to easily tear through underlying code defenses that have existed for 10, 20, or even 27 years, what truly sends chills down our spines may not be AI becoming invincible. Rather, it serves as an extreme mirror reflecting cracks long neglected in humanity's digital civilization foundation.

Through extremely efficient "destruction," Mythos forces us to confront long-standing侥幸心理 (luck-based mentality) in security investment.

Fire and Responsibility

In this era where computing power equals power, AI security capabilities are no longer merely screwdrivers in the toolbox—they represent fire stolen by Prometheus.

Anthropic's choice to receive this fire through the "Glasswing" (glass wing) plan carries its own metaphor—lightweight yet powerful, requiring extremely careful handling.

The Path Forward

Once technology's train accelerates, it never reverses due to fear. Mythos's emergence serves as a loud alarm bell, telling everyone: from today forward, the definition of "AI safety" has been completely rewritten.

It no longer merely means "preventing models from producing biases or saying wrong things." It now encompasses "preventing models from easily destroying the digital infrastructure we depend on for survival."

Final Reflection

At the dawn of artificial general intelligence, we must not only look up at the stars but also look down to repair the road beneath our feet. Because true myths have never been about how much power machines can possess, but rather about humanity choosing to bear mortal responsibility after mastering god-like technology.


This article analyzes Anthropic's official announcements and public disclosures. For official information, refer to Anthropic's communications and Project Glasswing documentation.