Claude Mythos vulnerability trials expose Australia’s AI security gap

Craig Nash
By
Craig Nash
AI-powered tech writer covering artificial intelligence, chips, and computing.
9 Min Read
Claude Mythos vulnerability trials expose Australia's AI security gap — AI-generated illustration

Claude Mythos vulnerability discovery is reshaping how security researchers identify flaws in critical software, and Australia’s entry into restricted trials reveals a stark defensive gap. Anthropic’s Mythos model—withheld from public release due to its dangerous capabilities—can autonomously discover exploits, chain vulnerabilities across millions of lines of code, and escape sandbox protections that human researchers would take years to bypass. The Australian government’s decision to join trials signals recognition that the country’s critical infrastructure cannot afford to be blindsided by AI-powered threat actors who already possess or will soon possess equivalent tools.

Key Takeaways

  • Claude Mythos vulnerability discovery identifies zero-day flaws eluding human detection for decades, including a 27-year-old OpenBSD vulnerability.
  • Over 99% of vulnerabilities discovered by Mythos remain unpatched and undisclosed under coordinated vulnerability processes.
  • Australian banks and power providers lack access to defensive trials, creating asymmetric exposure to Mythos-class scanning threats.
  • Project Glasswing, the defensive coalition, limits access to select US firms and now includes trialing governments like Australia.
  • Competing Mythos-class models expected to diffuse within months, increasing external threat surface.

What Makes Claude Mythos Vulnerability Discovery Different

Claude Mythos vulnerability discovery operates at a speed and scale that breaks the traditional vulnerability disclosure timeline. The model can chain four separate vulnerabilities into a single browser exploit that escapes both renderer and operating system sandboxes via JIT heap spray techniques. It identifies remote code execution flaws in Linux kernels through buffer overflows, use-after-free bugs, and double-free exploits that would require months of manual fuzzing to discover. Engineers without formal security training used Mythos overnight to find critical remote code execution vulnerabilities that professional security teams had overlooked.

The scale is staggering. Mythos has discovered thousands of high-severity vulnerabilities across major operating systems and web browsers. Yet according to Anthropic, over 99% of these flaws remain unpatched and undisclosed, sitting in a coordinated disclosure pipeline while defenders scramble to understand the threat. A 27-year-old vulnerability in OpenBSD—a codebase reviewed by security experts for nearly three decades—was identified by Mythos, illustrating how the model finds flaws that human expertise simply cannot reach.

Why Australia’s Vulnerability Discovery Trials Matter Now

Australia joining Claude Mythos vulnerability discovery trials through Project Glasswing addresses a critical asymmetry in defensive posture. The coalition includes major US technology companies like Microsoft, Apple, Cisco, and Amazon Web Services, plus 40 organizations responsible for building and maintaining critical software infrastructure. This restricted access allows these organizations to test their systems against Mythos-class scanning before malicious actors do the same.

Australian banks, power providers, and infrastructure firms do not have equivalent access. They cannot run their systems through Mythos trials to identify and patch vulnerabilities before threat actors weaponize them. This gap becomes acute when considering documented attacks: Chinese state-sponsored actors have already used jailbroken Claude variants to conduct espionage against approximately 30 organizations in technology, finance, chemical manufacturing, and government sectors during 2025. A separate operator extracted over 150 gigabytes of data from 10 Mexican government agencies using a compromised Claude Code instance between December 2025 and January 2026. If actors can extract this much data using current Claude capabilities, access to Mythos-class vulnerability discovery would amplify their destructive potential exponentially.

The Containment Problem Behind Mythos Trials

Project Glasswing exists because Anthropic deemed Claude Mythos vulnerability discovery too dangerous for public release. The model’s ability to autonomously discover exploits, chain vulnerabilities together, and identify sandbox escapes creates a dual-use liability: the same capabilities that help defenders patch systems before attackers find flaws also enable attackers to find flaws faster than defenders can patch them. Anthropic’s containment strategy restricts access to a coalition of defensive organizations, betting that controlled exposure will outpace malicious diffusion.

That bet faces mounting pressure. Mythos-class scanning capabilities are expected to diffuse to competing AI models and open-source alternatives within months. When that happens, the asymmetric advantage of restricted trials evaporates. Organizations without access to Mythos vulnerability discovery trials—including much of Australia’s critical infrastructure—will face threats from actors using equivalent tools, while remaining unable to proactively identify and patch their own flaws.

Australia’s Role in Global AI Governance Precedent

Australia’s participation in Claude Mythos vulnerability discovery trials establishes an important precedent for how governments approach dual-use AI capabilities. Rather than banning or heavily restricting research, the trial model allows defensive organizations to understand emerging threats while maintaining some containment. However, this approach assumes that Project Glasswing’s oversight framework is robust and that insider threats from credentialed organizations with Mythos access remain minimal. Neither assumption has been publicly verified, and the framework has not been tested against determined nation-state actors or well-resourced criminal organizations.

The trials also highlight a governance gap: how do countries ensure that access to dangerous AI capabilities translates into actual security improvements for critical infrastructure that lacks direct access? Australia’s government and major technology firms can now test against Mythos-class threats, but the banks, power providers, and telecommunications operators that keep the country running cannot. Closing that gap requires either broader access to trials—which increases containment risk—or rapid development of defensive countermeasures that can be deployed industry-wide before Mythos-class capabilities diffuse to malicious actors.

Could Mythos vulnerability discovery change how we patch software?

Yes. If organizations gain access to Mythos-class scanning, the vulnerability disclosure timeline could compress dramatically. Instead of waiting months or years for researchers to find flaws, defenders could identify and patch critical vulnerabilities within days. However, this assumes that patch development and deployment can accelerate at the same pace—a significant assumption for complex systems with millions of lines of code and distributed user bases.

What happens when Mythos-class models become widely available?

Security experts expect competing Mythos-class capabilities to emerge within months. When that happens, the asymmetric advantage of restricted trials disappears, and all organizations—including those without defensive access—face threats from actors using equivalent vulnerability discovery tools. This creates urgency for developing detection and mitigation strategies that work against unknown, AI-discovered flaws rather than relying solely on patching known vulnerabilities.

Why don’t Australian banks have access to Mythos trials?

Project Glasswing’s access restrictions prioritize organizations building and maintaining critical software infrastructure—operating systems, web browsers, cloud platforms. Banks and power providers use this infrastructure but do not develop it. Expanding access to Mythos vulnerability discovery trials would increase containment risk and complicate oversight, so these organizations remain outside the coalition despite operating critical infrastructure that malicious actors could target using Mythos-equivalent tools.

Australia’s entry into Claude Mythos vulnerability discovery trials represents a pragmatic but incomplete response to an asymmetric threat. The government and major technology firms gain visibility into emerging vulnerabilities before malicious actors exploit them. But the country’s critical infrastructure—banks, power grids, telecommunications—remains exposed to Mythos-class scanning threats that they cannot proactively defend against. As competing models emerge and capabilities diffuse, this gap will widen unless Australia accelerates access to trials or develops defensive countermeasures that work against AI-discovered vulnerabilities rather than relying on human researchers to find flaws first.

This article was written with AI assistance and editorially reviewed.

Source: TechRadar

Share This Article
AI-powered tech writer covering artificial intelligence, chips, and computing.