The $20,000 Bug Hunt: How Economics Turned Vulnerability Discovery Upside Down
The raw numbers behind Mythos’s vulnerability scanning tell a story that transcends any single exploit. Anthropic reported that roughly 1,000 scanning runs against OpenBSD cost under $20,000, with individual exploits costing under $1,000 each. To appreciate what this means, consider that a single zero-day exploit on the open market can sell for anywhere from $100,000 to over $1 million depending on the target. Mythos did not just find one — it found thousands, including a 27-year-old denial-of-service bug in OpenBSD’s TCP SACK implementation and a 17-year-old remote code execution flaw in FreeBSD’s NFS subsystem (assigned CVE-2026-4747). These are not obscure edge cases; they are vulnerabilities in foundational internet infrastructure that human security researchers and automated fuzzing tools missed for decades.
The 181-to-2 Firefox exploit ratio against Opus 4.6 represents not a linear improvement but a qualitative shift. When Anthropic says these capabilities ‘emerged from general improvements’ rather than explicit cybersecurity training, that claim — if true — carries profound implications. It suggests that future frontier models may develop similar offensive capabilities as an unintentional byproduct of scaling. The cost structure makes this especially destabilizing: at sub-$1,000 per exploit, the barrier to industrializing vulnerability discovery drops from nation-state budgets to modest research grants. Whether Mythos is uniquely capable or merely the first model to be publicly benchmarked this way, the economic equation it demonstrates cannot be easily dismissed. The YouTube channel Fireship captured this sentiment in a video titled ‘Claude Mythos is too dangerous for public consumption,’ which amassed 850,000 views and 30,000 likes within days — suggesting the economic implications resonated far beyond the security community.
Perhaps most striking is the statistic that 99%+ of discovered vulnerabilities remain unpatched. This creates an enormous asymmetry: Anthropic and its Glasswing partners now possess knowledge of thousands of exploitable flaws across every major operating system and browser, while the broader ecosystem remains exposed. The $100M+ in credits and $4M to open-source organizations represent Anthropic’s attempt to close this gap, but the sheer volume of findings raises questions about whether responsible disclosure at this scale is even logistically feasible.



