Anthropic Launches Project Glasswing To Harden Software Security

Anthropic is opening Project Glasswing, a restricted cybersecurity consortium that gives vetted partners access to Claude Mythos Preview — its most capable frontier model — to discover and remediate software vulnerabilities. Anthropic says Mythos, while trained as a general-purpose coding and reasoning model, has already identified thousands of vulnerabilities across major operating systems, browsers, websites, and apps. The company is not publicly releasing Mythos, citing misuse risk, and is providing $100 million in usage credits to partners including Apple, Microsoft, Amazon, Google, Broadcom, Cisco, CrowdStrike, Palo Alto Networks, the Linux Foundation and roughly 40 other critical-software maintainers and vendors.
What happened
Anthropic unveiled Claude Mythos Preview and launched Project Glasswing on April 7, 2026, offering private access to the new frontier model to a coalition of major tech, security, infrastructure, and open-source organizations. The company says it will not publicly release Mythos because of its potential for misuse; instead it is granting preview access to more than 40 organizations — described variously as a core partner group plus broader preview access — to scan and harden critical software. Anthropic claims Mythos identified “thousands of zero-day vulnerabilities,” many critical and some unchanged for decades.
Technical context
Mythos is positioned as a frontier-level Claude variant with strong agentic coding and reasoning capabilities rather than a model trained specifically for cyber offense. Anthropic describes the gain in vulnerability-finding as an emergent effect of large-scale coding and reasoning competence: the model is able to analyze large codebases, construct exploit chains in simulated environments, and surface patterns informed by historical bug fixes. Because such capabilities can be used offensively, Anthropic is treating the model as too risky for general release.
Key details from sources
Project Glasswing’s founding and participant list spans cloud providers, OS and hardware vendors, security firms, and open-source stewards: Apple, Amazon, Google, Microsoft, Cisco, Broadcom, CrowdStrike, Palo Alto Networks and the Linux Foundation are named among participants. Anthropic committed up to $100 million in Claude usage credits to the initiative. Company leaders framed the effort defensively: Newton Cheng said the model should give cyber defenders a “head start” against adversaries; Jared Kaplan described the project as meant “to raise awareness and to give good actors a head start on the process of securing open-source and private infrastructure and code.” Logan Graham called Mythos “the starting point for what we think will be an industry change point, or reckoning,” and warned practitioners to prepare for broader availability in “6, 12, 24 months.”
Operational claims include that Mythos found thousands of previously unknown or long-unpatched zero-days across major operating systems and web browsers. Anthropic’s rollout is gated: a small set of defensive partners are deploying the model on their systems to catalog exploit chains and mitigate vulnerabilities before broader diffusion. The model’s existence became public after a prior leak of draft documents in a data cache (reported earlier under the internal name “Capybara”).
Why practitioners should care
This is a consequential moment on three axes: model capability, security posture, and governance. First, Mythos signals that large models’ coding competence now meaningfully shifts the economics of vulnerability discovery — they can find complex exploit chains at scale, reducing time-to-discovery and making some classes of attacks materially easier to construct. Second, the defensive-first, gated-release approach highlights a practical response pattern: industry convening, shared threat intelligence, and resource commitments (Claude credits) to accelerate mitigation. Third, the move foregrounds governance and access-control trade-offs: gating prevents immediate misuse but also concentrates knowledge in a privileged set of organizations, raising questions about disclosure thresholds, responsible patching timelines, and who validates fixes.
For ML engineers and security teams this matters operationally. Expect pressure to integrate model-driven code-analysis tools into CI/CD, to develop red-team/blue-team workflows that incorporate model outputs, and to update threat models and logging to detect model-assisted probing. The Mythos rollout also creates a practical sandbox: defenders will be able to study model-generated exploit patterns and prioritize mitigations for high-risk dependencies in widely used libraries and OS components.
What to watch
- •Technical transparency: will Anthropic publish methodology, datasets, or reproducible evaluation of Mythos’ vulnerability discoveries? Current messaging emphasizes private sharing and coordination.
- •Disclosure norms: how will fixes be coordinated across vendors and open-source maintainers? The Linux Foundation’s involvement suggests an organized path for maintainers, but timelines matter.
- •Diffusion risk: Logan Graham’s timeline for broader capability availability (6–24 months) is a bellwether for when offensive actors might gain similar capability.
- •Vendor responses: watch how cloud providers and OS vendors operationalize Mythos findings into patches, mitigations, and security advisories.
Scoring Rationale
This initiative directly affects security workflows and threat modeling for AI-enabled vulnerability discovery. It mobilizes major platform vendors and commits significant resources, creating an important defensive precedent while highlighting systemic risks if such models proliferate.
Practice interview problems based on real data
1,500+ SQL & Python problems across 15 industry datasets — the exact type of data you work with.
Try 250 free problems


