Anthropic‘s Claude Mythos Preview model autonomously identified and exploited a 17-year-old remote code execution vulnerability in FreeBSD’s NFS implementation, now triaged as CVE-2026-4747. The same model has surfaced thousands of zero-day vulnerabilities across every major operating system and every major web browser during internal testing, with the oldest find being a 27-year-old bug in OpenBSD — an OS whose security posture is the gold standard. In response, Anthropic launched Project Glasswing, restricting Mythos Preview access to a curated group of large-organization partners and open-source maintainers so defenders can patch first, before equivalent capability inevitably proliferates. This is the most consequential AI-security news of 2026 so far, and it deserves a careful read.
What’s actually new
The capability itself is the headline. Prior LLMs could assist a security researcher who already knew where to look — finishing exploits, suggesting fuzzing harnesses, explaining vulnerable code paths. Claude Mythos operates an order of magnitude beyond that: it autonomously plans the search, reads target code, formulates hypotheses about exploit primitives, validates them via execution in a sandbox, and produces working proof-of-concept exploits without human intervention. The CVE-2026-4747 discovery — full unauthenticated RCE in FreeBSD NFS, exploitable by anyone on the internet — was found end-to-end by Mythos with a single high-level instruction.
The 27-year-old OpenBSD bug demands separate emphasis. OpenBSD has been the security-conscious OS for three decades, audited continuously by professional and academic researchers, with formal verification on portions of its kernel. That a frontier LLM found an exploitable defect that survived 27 years of human scrutiny says something specific: the search space of code review is large enough that humans miss things consistently, and the right kind of automated reviewer can catch what humans don’t. This isn’t a “more eyes” argument; it’s a different category of eye altogether.
Project Glasswing is the second half of the story. Rather than release Mythos Preview broadly, Anthropic gated access to organizations with concrete defensive responsibilities: AWS, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorgan Chase, the Linux Foundation, Microsoft, NVIDIA, Palo Alto Networks, and select open-source maintainers. The reasoning is laid out plainly in Anthropic’s announcement: the same capability that lets defenders find bugs lets attackers find them, so the responsible release pattern is “give defenders a head start.” The Glasswing partners are running Mythos against their own codebases, surfacing vulnerabilities, and patching them before the model — or any successor with similar capability — reaches broad availability.
The model itself is described as a general-purpose successor in the Claude family, with the security-research capability arising as an emergent property of broader reasoning improvements rather than as a domain-specific fine-tune. That detail matters: it means the next several frontier models from any major lab are likely to have similar offensive-security capabilities, whether or not those labs intend or advertise them.
Why it matters
- The vulnerability disclosure timeline just compressed. A capability that finds 27-year-old bugs in well-audited code can find newer bugs in less-audited code in hours. Defensive teams now have to assume that any latent vulnerability in their codebase will be discovered — by someone — within the operational lifetime of the next two model generations.
- Security-by-obscurity is dead, formally. The “small attack surface” defense has always been weaker than its proponents suggest, and it’s now untenable. Every line of shipping code is reachable by a model that can read, hypothesize, and validate.
- The defender-attacker arms race got faster. Glasswing-class restricted access models give defenders a months-to-years head start. That’s enough to harden critical infrastructure, but not enough to fix the long tail of legacy code. Triage hard.
- Open-source maintainers face new triage pressure. A solo maintainer with a popular library can suddenly receive dozens of high-quality CVE reports from automated systems. Without staffing, those reports pile up. Foundations and corporate sponsors need to fund maintenance commensurate with the new disclosure volume.
- Compliance frameworks lag the new capability. SOC 2, ISO 27001, FedRAMP — none of these explicitly require continuous AI-assisted vulnerability scanning yet. Within 18 months they will. Get ahead of it.
- The supply-chain integrity problem worsens. If an attacker can find zero-days in dependencies faster than maintainers can patch them, supply-chain attacks become the dominant threat vector. SBOM tooling, dependency-pinning discipline, and vendored-code reviews matter more than ever.
How to use it today
Claude Mythos itself is access-restricted via Project Glasswing — most readers won’t have direct API access, and that’s intentional. But the operational implications are immediate, and there are concrete steps every engineering and security team should take this quarter regardless of whether they have Mythos access.
- Update your dependency posture for CVE-2026-4747. If you run FreeBSD-based infrastructure with NFS exposed to untrusted networks, patch immediately. The exploit is straightforward and weaponized proof-of-concept code is now circulating in security-research circles.