Anthropic Mythos and OpenAI GPT-5.5-Cyber raise the AI cybersecurity stakes
TECH

Anthropic Mythos and OpenAI GPT-5.5-Cyber raise the AI cybersecurity stakes

45+
Signals

Strategic Overview

  • 01.
    Anthropic announced Claude Mythos Preview on April 7, 2026, a frontier model with strikingly strong cybersecurity and exploit-development capability that the company is deliberately keeping out of general release.
  • 02.
    Mozilla used Mythos Preview to identify 271 vulnerabilities patched in Firefox 150, while reporting that none of the bugs surfaced were beyond the reach of an elite human researcher — framing Mythos as a quantitative acceleration rather than a new class of discovery.
  • 03.
    OpenAI followed on May 7, 2026 with GPT-5.5-Cyber, a limited-preview model for vetted security teams that the company says is 'not intended to significantly increase cyber capability beyond GPT-5.5' but is tuned to be more permissive on security-related tasks.
  • 04.
    The disclosure prompted government-level alarm: Treasury Secretary Bessent and Fed Chair Powell convened an emergency meeting with major bank CEOs in the days after Mythos was announced, while UK AISI confirmed Mythos as the first model to fully solve a simulated network takeover range.

From 22 to 271: What Actually Changed Between Opus 4.6 and Mythos

From 22 to 271: What Actually Changed Between Opus 4.6 and Mythos
Firefox 148 (22 vulnerabilities, Claude Opus 4.6, 2025) vs Firefox 150 (271 vulnerabilities, Claude Mythos Preview, Apr 2026).

The most concrete way to read the Mythos jump is to put the two Mozilla collaborations side by side. In 2025, Anthropic's Claude Opus 4.6 helped Mozilla close 22 security-sensitive bugs in Firefox 148. Six months later, Mythos Preview helped close 271 vulnerabilities in Firefox 150 — an order-of-magnitude move on the same target, with the same defender, in the same harness. Anthropic's own red-team note pushes the contrast harder on the offensive side: where Opus 4.6 had near-zero success producing working Firefox exploits, Mythos 'developed working exploits 181 times.' Mozilla's CTO Bobby Holley sums up the lived experience as 'Defenders finally have a chance to win, decisively,' while still cautioning that none of the bugs were beyond an elite human researcher's reach.

What changed is not really the class of bug being found, but the unit economics of finding them. AISI's independent evaluation puts numbers on this: Mythos solves expert-level CTF tasks 73% of the time — tasks AISI says no model could complete before April 2025 — and is the first model to fully solve a simulated network takeover (TLO) range, succeeding in 3 of 10 attempts and averaging 22 of 32 attack steps. That is the inflection. A capability that previously required either months of expert human labor or an orchestrated, brittle pipeline of older models has compressed into a single prompt-and-tool-loop run. Reports referenced by Fox News claim Mythos surfaced over 2,000 previously unknown software vulnerabilities in roughly seven weeks. Whether all of those are 'critical' is a separate fight — the most-upvoted r/Anthropic critique points out that Anthropic only manually verified under 200 of them — but even the verified subset reframes vulnerability research from artisanal craft to industrial throughput.

The $100M Coalition Buying a 6-Month Head Start

Project Glasswing is the part of this story most likely to outlive the news cycle. Anthropic is not selling Mythos. It is gifting up to $100M in usage credits, plus $4M in donations to open-source security organisations, to a coalition that reads like the asset register of US digital infrastructure: AWS, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorganChase, the Linux Foundation, Microsoft, NVIDIA, Palo Alto Networks. Anthropic restricted Mythos to internal scanning by these partners and explicitly stated it does 'not plan to make Mythos Preview generally available.' That is a radical departure from the standard frontier-model launch playbook, and it directly couples Anthropic's commercial brand to the patch posture of half the Fortune 100.

The pricing of that gift only makes sense in light of Dario Amodei's stated 6-12 month 'moment of danger' window before Chinese and other peer models match Mythos's cyber capability. Anthropic is essentially fronting the inference bill for defenders to race ahead of attackers during that window. Jamie Dimon's framing — 'very heightened risk' but workable inside a year for JPMorgan's own apps — is the customer-side version of the same calculus. The implicit ask is enormous: trust Anthropic to choose which sectors get this advantage first. Bruce Schneier puts the governance discomfort into words by warning that Anthropic is 'unilaterally deciding which critical infrastructure gets defended first.' There is no public oversight of the Glasswing membership list, no obligation to share findings outside the coalition, and no statutory definition of what 'vetted partner' even means.

The Leaky Moat: URL Guessing, Vidoc's Reproduction, and OpenAI's 30-Day Reply

If Mythos's containment is meant to be the safety story, the containment is already visibly fraying. Within roughly two weeks of the announcement, Fortune reported that an unauthorized group had located the model by guessing its hosting URL based on Anthropic's predictable model-naming conventions — a story that found a large audience on r/technology and dominated the day's tech-news framing. The irony is not subtle: a model whose entire premise is 'too dangerous to release' was breached on the URL layer before its capabilities ever needed to be probed. That single incident reframes the threat model. The exclusivity is not really about model weights; it is about access discipline at the perimeter of a coalition with thousands of human members.

The technical case for exclusivity is on shakier ground. Vidoc Security Lab reproduced multiple Mythos findings using the publicly available Claude Opus 4.6 and GPT-5.4, concluding that 'public models can already achieve much the same results' and that the strategic moat is operationalisation, not raw model access. The most-upvoted r/Anthropic critique amplifies this with a more pointed claim — that small open-weights models, one as small as 3.6B parameters at $0.11 per million tokens, recovered Mythos's flagship FreeBSD finding when given the relevant code. OpenAI then completed the picture by launching GPT-5.5-Cyber on May 7 in limited preview for vetted teams, and explicitly characterising it as 'not intended to significantly increase cyber capability beyond GPT-5.5' but tuned to be more permissive on security tasks. Read together: the capability is broadly available, the harness and the policy posture are the actual product, and Anthropic's exclusivity window is measured in days, not the 6-12 months Amodei staked out.

Patch Tuesday Is Dead: What CISOs Should Actually Plan For

Beyond the marketing fight, the operational implication is what gets lost. The SANS Institute's framing on the social conversation, attributed to Rob T. Lee, is the bluntest version on the record: 'The window between discovery and weaponization has collapsed into hours.' If even a fraction of that is true for the public-model tier — and Vidoc's reproduction work suggests it is — then the assumed cadence of monthly or quarterly patch cycles becomes a structural liability. Practitioner threads on Reddit converge on the same prediction in less measured language. Defensive teams that depend on a multi-week triage-to-deploy pipeline are budgeting for a threat surface that no longer exists in that form.

What actually changes for a CISO in the next two quarters is less about buying Mythos access and more about restructuring around a faster loop. Mozilla's lesson is instructive: the 271-bug Firefox 150 was possible because Mozilla had already invested, since February 2026, in a continuous AI-assisted scanning workflow tied to a release train that could absorb a single huge security batch. Most enterprises do not have that absorption capacity. AISI's calibration — that Mythos's real-world reach against well-defended enterprises remains unproven — should not be read as 'no need to prepare,' but as 'the attack surface that benefits most from this is your sloppy long-tail of internal apps and dependencies, not your hardened perimeter.' The bank story underlines this. The Treasury-Fed emergency meeting and Dimon's 'one year for our own apps' timeline both implicitly concede that the long tail of internal financial software is where the next 12 months actually play out.

Historical Context

2025
An earlier collaboration using Claude Opus 4.6 yielded fixes for 22 security-sensitive bugs in Firefox 148, foreshadowing the Mythos jump and establishing the baseline against which Mythos's 271-bug result is measured.
2026-02
Mozilla began round-the-clock work using frontier AI models to surface latent Firefox vulnerabilities, the program that culminated in the Mythos engagement.
2026-03-26
A Fortune report based on a data leak first publicly disclosed the existence of an Anthropic model called Mythos representing a 'step change' in capabilities.
2026-04-07
Anthropic officially announced Claude Mythos Preview and Project Glasswing, releasing the model only to a coalition of vetted partners including AWS, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorganChase, the Linux Foundation, Microsoft, NVIDIA and Palo Alto Networks.
2026-04-10
Bessent and Powell convened an emergency meeting with big-bank CEOs to discuss systemic cyber implications of Mythos's disclosure.
2026-04-21
Firefox 150 shipped with patches for 271 vulnerabilities credited to the Mythos collaboration, the largest single-release security batch in Firefox history.
2026-04-23
Reports surfaced of users locating Mythos by guessing its hosting URL based on Anthropic's predictable model-naming conventions, intensifying scrutiny of the company's containment posture.
2026-05-05
Amodei publicly framed the post-Mythos period as a 6-12 month 'moment of danger' before peer models match Mythos's capabilities.
2026-05-07
OpenAI rolled out GPT-5.5-Cyber in limited preview to vetted security teams alongside the Trusted Access for Cyber framework, collapsing Anthropic's exclusivity narrative roughly 30 days after Mythos's announcement.

Power Map

Key Players
Subject

Anthropic Mythos and OpenAI GPT-5.5-Cyber raise the AI cybersecurity stakes

AN

Anthropic

Developer of Mythos Preview and gatekeeper of access via Project Glasswing; pledging up to $100M in usage credits and $4M in donations to open-source security organisations while declining to make the model generally available.

MO

Mozilla

Open-source partner whose Firefox 150 release shipped 271 Mythos-credited fixes, providing the headline real-world validation of the model's defensive value.

OP

OpenAI

Competitor releasing GPT-5.5-Cyber via a Trusted Access for Cyber (TAC) framework, taking a more permissive but capability-equivalent stance for vetted security professionals 30 days after Anthropic's announcement.

JP

JPMorgan Chase / Jamie Dimon

Glasswing partner and high-profile bank voice publicly framing Mythos as 'very heightened risk' while crediting Anthropic's restricted-release approach with giving the financial sector time to plan.

U.

U.S. Treasury / Federal Reserve

Bessent and Powell convened an emergency meeting with major bank CEOs in the days following Mythos's disclosure, signalling government-level concern about systemic financial cyber risk.

UK

UK AI Security Institute (AISI)

Independent evaluator that benchmarked Mythos's cyber capabilities and confirmed it as the first model to autonomously complete a simulated network takeover, while noting real-world enterprise reach remains unproven.

VI

Vidoc Security Lab

Independent security firm that reproduced multiple Mythos findings using public GPT-5.4 and Claude Opus 4.6, undercutting the narrative that Mythos uniquely raises offensive risk.

Source Articles

Top 5

THE SIGNAL.

Analysts

"Frames Mythos disclosure as a 6-12 month 'moment of danger' window during which defenders must patch tens of thousands of newly surfaced flaws before peer (notably Chinese) models catch up, emphasising ransomware risk to schools, hospitals and banks: 'The danger is just some enormous increase in the amount of vulnerabilities, in the amount of breaches, in the financial damage that's done from ransomware on schools, hospitals, not to mention banks.'"

Dario Amodei
CEO, Anthropic

"Argues the breakthrough is more incremental than alarming: 'We see Mythos as a real but incremental step, one in a long line of incremental steps.' Warns that Anthropic is unilaterally deciding which critical infrastructure gets defended first and expects defenders to win in patchable systems, but a rough transition before then."

Bruce Schneier
Security technologist, lecturer at Harvard Kennedy School

"Calls Mythos a watershed for defenders — 'Defenders finally have a chance to win, decisively' — while reiterating that the bugs were within reach of expert humans, just not at this scale or speed."

Bobby Holley
CTO, Mozilla

"Calls Mythos a 'very heightened risk' but credits Anthropic's restricted-release approach with giving the financial sector time to plan; says JPMorgan can likely handle its own apps within a year."

Jamie Dimon
CEO, JPMorgan Chase

"Demonstrates that publicly available Claude Opus 4.6 and GPT-5.4 reproduce many of Mythos's findings: 'The takeaway is not whether Mythos is better or more powerful. It is that public models can already achieve much the same results.' Argues the strategic moat is operationalisation, not raw model access."

Vidoc Security Lab research team
AI security research firm
The Crowd

"We partnered with Mozilla to test Claude's ability to find security vulnerabilities in Firefox. Opus 4.6 found 22 vulnerabilities in just two weeks. Of these, 14 were high-severity, representing a fifth of all high-severity bugs Mozilla remediated in 2025."

@@AnthropicAI0

"Anthropic released Mythos on Tuesday. By Sunday, 60+ security leaders had written the briefing the community needed. "The window between discovery and weaponization has collapsed into hours." — @RobTLee, SANS Institute. 181 working Firefox exploits."

@@SANSInstitute0

"Mozilla has patched 271 vulnerabilities in Firefox after using Anthropic's Claude Mythos Preview AI model to scan its codebase. Part of Anthropic's cybersecurity-focused Project Glasswing, the AI identified these issues with performance that matched human-level capability."

@@Pirat_Nation0

"Unauthorized group has gained access to Anthropic's exclusive cyber tool Mythos, report claims"

@u/1nfer1or10000
Broadcast
Claude Mythos is too dangerous for public consumption...

Claude Mythos is too dangerous for public consumption...

Why Anthropic's Mythos Is Sparking Alarm

Why Anthropic's Mythos Is Sparking Alarm

Claude Mythos is Actually Scary

Claude Mythos is Actually Scary