Claude Mythos autonomously found and chained together several vulnerabilities in the Linux kernel, allowing an attacker to escalate from an ordinary user to complete control of the machine.
AI Fact-Check
“Anthropic's own Frontier Red Team blog and multiple tech publications confirm this capability. A post from Anthropic states Mythos "autonomously obtained local privilege escalation exploits on Linux... by exploiting subtle race conditions and KASLR-bypasses." Reporting from Forbes and VentureBeat specifies that the model chained multiple (two to four) low-severity vulnerabilities to achieve full local privilege escalation, or complete machine control from a user account. Context: This capability is part of a broader set of findings where the model, named Claude Mythos Preview, identified thousands of zero-day vulnerabilities across all major operating systems and browsers. Due to these powerful offensive capabilities, Anthropic has not made the model publicly available, instead providing it to a consortium of tech companies (including the Linux Foundation) under "Project Glasswing" to proactively find and fix security flaws.”
Source Videos (1)
Claude Mythos and the end of software
Theo - t3․gg
Related Claims
Mythos autonomously wrote a remote code execution exploit on FreeBSD's NFS server that gained full root access by splitting a chain over 20 packets.
The earlier Mythos preview version developed a moderately sophisticated multi-step exploit to gain broad internet access from a system meant to be restricted.
Project Glasswing identified multiple vulnerabilities in Linux that permit a user without permissions to escalate to administrator privileges by executing a specific binary on their machine.
Project Glasswing utilized the Claude Mythos Preview model to scan open-source code, specifically prioritizing operating systems because they underpin the entire internet infrastructure.
On Humanity's Last Exam, Claude Mythos improved its score from 40% to 56.8%, and to 64.7% when given tools.