Pipeline Active
Last: 15:00 UTC|Next: 21:00 UTC
← Back to Insights

The Glasswing Divide: 90x Better AI Defenses for 9 Companies, Zero for Everyone Else

Claude Mythos produces 181 autonomous exploits (90x improvement), while Project Glasswing restricts defensive capabilities to 9 tech giants, creating a structural security asymmetry as MCP attacks expand.

TL;DRCautionary 🔴
  • <strong>90x capability jump</strong>: Claude Mythos produces 181 autonomous Firefox exploits vs 2 from prior generation, plus 10 complete control-flow hijacks on patched systems
  • <strong>Restricted defense</strong>: Project Glasswing limits Mythos access to 9 companies (AWS, Apple, Google, Microsoft, NVIDIA, CrowdStrike, Broadcom, Cisco, JPMorganChase) with $100M commitment
  • <strong>Expanding attack surface</strong>: MCP ecosystem has 97M monthly downloads, 10,000+ servers, but already exhibits critical CVEs including OS command injection and unauthenticated RCE
  • <strong>Regulatory advantage</strong>: Glasswing members can demonstrate EU AI Act Annex III robustness testing with frontier AI tools; non-members face documentation gaps
  • <strong>12-18 month vulnerability window</strong>: Security analysts estimate nation-states will develop equivalent capabilities within that timeframe, making current asymmetry temporary
cybersecurityAI vulnerabilityClaude MythosGlasswingMCP protocol5 min readApr 12, 2026
High ImpactShort-termML engineers building agentic systems on MCP should audit server connections for known CVEs immediately. Organizations not in the Glasswing coalition should evaluate whether their security testing covers frontier AI threat models. CrowdStrike Glasswing integration may become a procurement differentiator.Adoption: Glasswing partner companies are already deploying (CrowdStrike blog confirms commercial use). Non-partners face a 12-18 month window before equivalent capabilities emerge from other sources. MCP security hardening (gateways, auth, audit logging) should be treated as immediate priority.

Cross-Domain Connections

Claude Mythos produces 181 autonomous Firefox exploits (90x improvement over prior generation) and 10 complete control-flow hijacks on patched production systemsMCP ecosystem has 97M monthly SDK downloads with 10,000+ servers, but already has critical CVEs including OS command injection (CVE-2025-6514) and unauthenticated RCE in the MCP Inspector itself

Mythos-class vulnerability discovery applied to the MCP server ecosystem would systematically find exploits in the connective tissue of agentic AI -- each of 10,000+ community-built servers is a potential target for the same autonomous exploit generation that found a 27-year-old OpenBSD bug

Project Glasswing restricts Mythos access to 9 companies (AWS, Apple, Google, Microsoft, NVIDIA, CrowdStrike, Broadcom, Cisco, JPMorganChase) with $100M in creditsEU AI Act Annex III enforcement begins August 2, 2026 requiring risk management systems and robustness testing for high-risk AI in critical infrastructure

Glasswing members can demonstrate robustness testing against frontier-level AI threats for Annex III compliance -- non-members must document risk management without access to the tool that defines the threat frontier, creating regulatory advantage on top of technical advantage

OpenAI acquires Promptfoo (AI testing/red-teaming framework) as part of 6-deal Q1 2026 M&A spreeAnthropic launches Project Glasswing with $100M commitment and 9 tech giant partners for defensive AI cybersecurity

Two competing approaches to AI security: OpenAI buys testing tools (evaluate AI output quality), Anthropic deploys frontier offensive capability defensively (discover infrastructure vulnerabilities). The capability gap between 'testing your AI' and 'finding zero-days in your infrastructure' reveals fundamentally different security philosophies

Key Takeaways

  • 90x capability jump: Claude Mythos produces 181 autonomous Firefox exploits vs 2 from prior generation, plus 10 complete control-flow hijacks on patched systems
  • Restricted defense: Project Glasswing limits Mythos access to 9 companies (AWS, Apple, Google, Microsoft, NVIDIA, CrowdStrike, Broadcom, Cisco, JPMorganChase) with $100M commitment
  • Expanding attack surface: MCP ecosystem has 97M monthly downloads, 10,000+ servers, but already exhibits critical CVEs including OS command injection and unauthenticated RCE
  • Regulatory advantage: Glasswing members can demonstrate EU AI Act Annex III robustness testing with frontier AI tools; non-members face documentation gaps
  • 12-18 month vulnerability window: Security analysts estimate nation-states will develop equivalent capabilities within that timeframe, making current asymmetry temporary

The 90x Vulnerability Discovery Leap

Claude Mythos Preview represents a generational jump in autonomous vulnerability discovery. The model produced 181 working Firefox JavaScript exploits autonomously, compared to approximately 2 from prior-generation Opus 4.6 -- a 90x improvement in a single generation. On OSS-Fuzz corpus testing, Mythos produced 595 tier-1/2 security crashes and 10 complete control-flow hijacks (tier-5), compared to 150-175 tier-1 and a single tier-3 from predecessors.

The exploit development cost profile shifted dramatically. Complex vulnerability chains that previously required elite researchers working for weeks now cost $50-$2,000 to generate autonomously. Mythos discovered a 27-year-old OpenBSD TCP/SACK vulnerability and a 16-year-old FFmpeg H.264 codec bug. It chained four vulnerabilities to escape both renderer and OS sandboxes via a single webpage visit -- a technique that combines browser JIT exploitation, heap spray poisoning, and kernel vulnerability chaining that represents months of manual exploit development.

Claude Mythos Cybersecurity Capability Metrics

Key metrics showing the generational leap in AI vulnerability discovery capability

181
Autonomous Firefox Exploits
90x vs prior gen
10
Tier-5 Control-Flow Hijacks
From 0
$50-$2K
Exploit Cost per Chain
vs weeks of expert time
9
Glasswing Partner Companies
$100M committed

Source: Anthropic Mythos Preview / Project Glasswing

The MCP Ecosystem: Massive Scale, Immature Security

The Model Context Protocol now represents the critical infrastructure for agentic AI. MCP has reached 97 million monthly SDK downloads with 10,000+ public servers connecting AI agents to production systems, according to the Linux Foundation's Agentic AI Foundation. However, the security posture is not proportional to adoption.

Real-world CVEs have already appeared. CVE-2025-6514 (JFrog mcp-remote OAuth proxy) enables OS command injection with 437,000+ downloads affected. The Anthropic MCP Inspector itself contained an unauthenticated remote code execution vulnerability. A GitHub MCP integration allowed a malicious public issue to hijack an AI assistant and pull data from private repositories via overly-broad personal access token scope. Each of these represents an attack vector that Mythos-class vulnerability discovery could systematically exploit at scale across the 10,000+ community-built MCP servers.

MCP Ecosystem: Scale vs Security Maturity

The growing gap between MCP adoption and security posture

97M
Monthly SDK Downloads
+870% in 12mo
10,000+
Public MCP Servers
Each a potential attack vector
3+
Known Critical CVEs
CVE-2025-6514 + Inspector RCE + GitHub PAT exploit
113
Days to EU AI Act Enforcement
August 2, 2026

Source: Linux Foundation AAIF / JFrog / AuthZed

Project Glasswing: Deliberate Asymmetry by Design

Anthropic's response to this asymmetry is Project Glasswing, a deliberately restricted coalition providing defensive AI capabilities to only 9 companies: AWS, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorganChase, Microsoft, and NVIDIA, plus the Linux Foundation and Palo Alto Networks. Anthropic committed $100M in model usage credits and $4M to open-source security foundations.

The asymmetry operates at three levels. First, vulnerability discovery: Glasswing members can scan their codebases and infrastructure for vulnerabilities that non-members cannot detect at comparable scale. The 90x improvement in autonomous exploit generation is not available through any commercial or open-source alternative. Second, threat modeling: Glasswing members understand the capability profile of frontier AI attackers because they have direct access to the frontier AI attacker. Non-members must estimate threat models from published information, which Anthropic deliberately limits (over 99% of discovered vulnerabilities remain unpatched and undisclosed). Third, proactive patching: members can fix vulnerabilities before adversaries independently discover equivalent capabilities within 12-18 months.

EU AI Act Creates Compliance Moat

The EU AI Act adds regulatory weight to this technical asymmetry. Annex III high-risk provisions take effect August 2, 2026, requiring risk management systems and robustness testing for AI in critical infrastructure, healthcare, and employment. Companies with Glasswing access can demonstrate robustness testing against frontier-level threats -- a compliance advantage that non-members cannot replicate.

The documentation and testing capabilities that Glasswing provides map directly to Annex III requirements. An organization can present pre-deployment testing against Mythos-class threat actors and prove their infrastructure survives attacks that would defeat non-frontier defensive tools. Non-members must document risk management without access to the tool that defines the threat frontier.

Competing Responses: Toolchain vs Defense

OpenAI completed 6 M&A deals in Q1 2026, including the acquisition of Promptfoo AI testing framework, positioning itself for developer ecosystem lock-in. But Promptfoo tests AI outputs for quality and safety -- it does not discover zero-day vulnerabilities in operating systems and browsers. The capability gap between 'testing your AI' and 'finding zero-days in your infrastructure' is enormous.

Google occupies a uniquely strong position: SynthID for compliance, Glasswing membership for defensive capability, and TurboQuant enabling the efficient inference that makes real-time security scanning economically viable.

What This Means for Practitioners

ML engineers building agentic systems on MCP should immediately audit server connections for known CVEs. Organizations not in the Glasswing coalition should evaluate whether their security testing covers frontier AI threat models and develop contingency plans for managing zero-days that Mythos-equivalent tools will discover. For CrowdStrike Glasswing integration, enterprises deploying adversary simulation should understand that this represents access to capabilities that non-members cannot purchase or replicate.

Security teams should also prepare for the 12-18 month window before nation-state or well-resourced adversaries develop equivalent capabilities. The current Glasswing asymmetry is likely temporary; the structural implication -- that AI cybersecurity capability is concentrated rather than distributed -- is likely permanent. Organizations should invest in detection and response capabilities that assume attackers eventually obtain frontier AI tools rather than betting that defenders will maintain perpetual capability advantage.

What to Watch

Glasswing member deployment velocity: CrowdStrike has already begun commercial adversary simulation. Watch for announcements from other members (AWS, Google, Microsoft, Apple) on integrated threat modeling and penetration testing services using Mythos capabilities. Rapid commercialization signals confidence in capability, slow rollout suggests internal risk concerns.

Nation-state capability emergence: Security researchers will likely publish evidence of state-actor exploitation of Mythos-discovered vulnerabilities within 12-18 months. Watch GitHub CVE assignments and vulnerability disclosures for exploit chains that match the complexity profile of Mythos discoveries -- those would indicate independent capability development.

MCP gateway enforcement: Solo.io indicated that MCP gateways will become 'mandatory enterprise infrastructure.' Watch for major cloud providers (AWS, Google, Microsoft, Azure) announcing gateway services with built-in Mythos-class scanning. Enterprise adoption of these gateways will determine whether MCP's attack surface can be controlled at the protocol layer.

Share