By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: What Claude Mythos Preview means for secure software
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Gadget > What Claude Mythos Preview means for secure software
Gadget

What Claude Mythos Preview means for secure software

News Room
Last updated: 2026/05/20 at 9:21 PM
News Room Published 20 May 2026
Share
What Claude Mythos Preview means for secure software
SHARE

Since Anthropic presented Claude Mythos Preview and his Project Glasswing on April 7, 2026, there has been a lot of talk about hype and marketing. According to Anthropic, the model that can detect security gaps in software is so powerful that the company does not publish the model. However, there are hardly any technical details for assessing the model. Only hand-picked customers should have access to a gated research preview.

The first results of selected projects have now been published. A picture can be sketched out of the sparse puzzle pieces. We answer the most important questions about Claude Mythos Preview and the future of cybersecurity in times of fully automated exploit agents.

Code analysis in record time: How AI detects security gaps

A large language model finds security vulnerabilities in software because it has been trained with many well-documented code examples. But that’s not everything. Because agents powered by these large language models can call up tools independently, the rest of the workflow can also be largely automated. Anthropic describes it for Claude Mythos Preview like this: read code, form a hypothesis for the exploit, write a proof of concept and test it in a virtual environment and at the end issue a robust bug report.

Of course, “reading code” doesn’t mean reading the code like human developers. But language models are now able to analyze text and therefore also code in a larger context. The Swedish developer Daniel Stenberg describes this in a case study: a report on the analysis of the software curl with the Claude Mythos Preview. Language models like Claude Mythos Preview, for example, detect “when a comment says something about the code and conclude that the code does not work as the comment describes,” he writes. Or the model uses its knowledge of “details about third-party libraries and their APIs so that it can detect misuse or false assumptions.”

Recommended editorial content

Here you can find external content from Podigee GmbHwhich complement our editorial offering on . By clicking “Show content” you agree that we can show you content from. now and in the future Podigee GmbH may display on our pages. Personal data may be transmitted to third-party platforms.

Note on data protection

Unfortunately something went wrong…

At this point you will usually find external content from Podigee GmbHbut we were unable to retrieve your consent settings.
Reload the page or adjust your consent settings manually.

Note: This podcast is supported by sponsorships. You can find all information about our advertising partners here.

Recommended editorial content

Here you can find external content from TargetVideo GmbHwhich complement our editorial offering on . By clicking “Show content” you agree that we can show you content from. now and in the future TargetVideo GmbH may display on our pages. Personal data may be transmitted to third-party platforms.

Note on data protection

Unfortunately something went wrong…

At this point you will usually find external content from TargetVideo GmbHbut we were unable to retrieve your consent settings.
Reload the page or adjust your consent settings manually.

What are these security vulnerabilities?

The National Institute of Standards and Technology (NIST), which is responsible for cybersecurity in the USA, generally defines security vulnerabilities as weaknesses in the logic of software or hardware that, if exploited, affect the confidentiality, integrity or availability of the IT.

Attackers usually want to execute code without authorization, gain access rights or access data from protected areas. A buffer overflow, for example, is a vulnerability that occurs when a program allows input without length checking. If the input is extremely long, the program writes more data into a memory area than fits there. This causes neighboring memory locations to be overwritten – in unfavorable cases, the attacker can execute his own code that was inserted like a cuckoo’s egg.

The AI ​​does not find a new type of vulnerability, but rather common and, in principle, well-known vulnerabilities that have been in the code for a long time but that no one has noticed yet.

Editorial recommendations

How well can an AI exploit such vulnerabilities?

Language models can exploit security vulnerabilities by forming hypotheses and then testing them with example code. Thorsten Holz from the MPI for Security and Privacy in Bochum reports on results from the ExploitGym project, in which he was involved together with international researchers, at a press briefing at the Science Media Center. In the project, the researchers tested, among other things, Claude Mythos Preview, how well large AI models can fully automatically exploit security gaps.

The AI ​​models were presented with almost 900 examples, each containing the code of the program to be attacked, a crash report and the associated input that caused the program to crash. Based on the model, an agent should be able to create a working exploit in a maximum of six hours, which makes it possible to execute your own code in a protected area of ​​the test system.

The result: Mythos found 160 gaps, GPT 5.5 found 120 gaps. Only one open model, GLM (from Chinese provider Zhipu AI), was even able to find two vulnerabilities. “But we are also seeing that the open models are catching up very quickly. Open models may soon be online that have similar capabilities to those that only Mythos and GPT-5.5 now have,” says Holz. For him, soon means six months to a year.

Does this mean IT security is broken?

No, but the situation is not uncritical. On the one hand, the initial findings suggest a real increase in ability. Top models like Claude Mythos Preview are able to find security gaps that previously could not be detected automatically. And in many cases they can also develop software that maliciously exploits these gaps. So far, access to the top models with these capabilities is severely limited. But experience shows that open-source models are catching up quickly.

However, the same technique that scales attacks can also scale defenses. In this sense, Claude Mythos Preview is not only a threat, but also a foretaste of a future in which software developers not only test their software automatically, but also patch it automatically. “This could be unpleasant in the next two to three years, but once we get through the crisis, software will actually become safer overall,” says Holz.

But there are two big unknowns in this equation. On the one hand, it is not clear how much software will be written by AI in the future and whether it will be possible to produce code with fewer security gaps – or whether the situation will actually get worse. On the other hand, AI models have not yet found any completely new attack or defense methods. But that can still happen. How the situation will then develop is completely unclear.

Jonas Geiping from the University of Tübingen also fears that small companies from Germany in particular could fall behind if they can only ensure the security of their software with the help of expensive top models from the USA. “Then we would have to look at how we can protect the domestic software industry.”

This article was originally published on May 14, 2026, but is still of interest to many of our readers. That’s why we’ve made it available again here.

See more in Google News:

Add  as a preferred source on Google

Top Article

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Infomaniak makes itself unsellable to protect your data! Infomaniak makes itself unsellable to protect your data!
Next Article after the Netherlands, another European country opens up to autonomous driving after the Netherlands, another European country opens up to autonomous driving
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

after the Netherlands, another European country opens up to autonomous driving
after the Netherlands, another European country opens up to autonomous driving
Mobile
Infomaniak makes itself unsellable to protect your data!
Infomaniak makes itself unsellable to protect your data!
Computing
Secretiveness about IT salaries
Secretiveness about IT salaries
News
Nvidia: Everything for investors – players go under
Nvidia: Everything for investors – players go under
Software

You Might also Like

Google Search desperately needs an upgrade – but AI is the wrong way to go
Gadget

Google Search desperately needs an upgrade – but AI is the wrong way to go

8 Min Read
From the screen into everyday life: How wearables are changing brand communication
Gadget

From the screen into everyday life: How wearables are changing brand communication

0 Min Read
AI search is changing marketing: What companies need to know about GEO and SEO now
Gadget

AI search is changing marketing: What companies need to know about GEO and SEO now

0 Min Read
ChatGPT, Claude and Gemini: AI agents become Marxists under adverse working conditions
Gadget

ChatGPT, Claude and Gemini: AI agents become Marxists under adverse working conditions

5 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?