The mechanism: why Mythos is 'too dangerous' for an open release
Mythos Preview is not a general-purpose chatbot with a red-team skin. According to Anthropic's own disclosure, the model is 'capable of identifying and then exploiting zero-day vulnerabilities in every major operating system and every major web browser when directed by a user to do so.' That is the rationale Anthropic offers for withholding it from public release and parceling access to roughly 40 organizations via Project Glasswing. In practice, Mythos compresses the most labor-intensive phase of offensive cybersecurity — enumerating bugs in complex, unfamiliar codebases — into automated runs.
The UK AI Security Institute's evaluation puts hard numbers on the shift. AISI reported a 73% success rate on expert-level capture-the-flag challenges and recorded Mythos as 'the first model to solve TLO from start to finish, in 3 out of its 10 attempts' on The Last Ones, a 32-step cyber range that takes human experts around 20 hours. Anthropic's own disclosures claim working exploits on the first attempt in more than 83% of tested cases, including vulnerabilities in code more than 27 years old. That is the capability profile the NSA is reportedly pointing at its own networks for defensive scanning — and the same profile that has the Bank of England privately briefing banks.


