Anthropic AI Finds Thousands of Software Vulnerabilities

Anthropic's AI model, Mythos, has identified thousands of software vulnerabilities, including critical ones. Experts discuss the implications for cybersecurity, particularly within the crypto industry.

6 min read
A person works on a laptop displaying lines of code, with a CNBC logo in the corner.
Image credit: CNBC· CNBC

Anthropic's advanced AI model, Mythos, has demonstrated a remarkable capability in identifying thousands of software vulnerabilities, including those of high and critical severity. This breakthrough, detailed in a recent report, suggests a significant shift in how software security can be assessed and maintained. The AI's ability to pinpoint flaws that human eyes might miss could revolutionize bug hunting, but it also introduces new challenges and concerns for the cybersecurity landscape.

Anthropic AI Finds Thousands of Software Vulnerabilities - CNBC
Anthropic AI Finds Thousands of Software Vulnerabilities — from CNBC

Anthropic's Mythos AI: A Cybersecurity Powerhouse

Anthropic, a prominent AI safety and research company, has developed the Mythos AI model, which has shown an uncanny ability to detect vulnerabilities in software. The model's advanced capabilities allow it to analyze code and identify potential weaknesses with unprecedented speed and accuracy. This is particularly significant given the increasing complexity of software and the ever-evolving tactics of cyber attackers.

Finding Thousands of Flaws

The report highlights that Mythos has identified a substantial number of vulnerabilities, many of which are rated as high or critical in severity. This includes multiple complete authentication bypasses that could allow unauthorized users to gain administrator privileges. Additionally, the AI found ways to bypass account login systems without requiring passwords or two-factor authentication codes. It also identified denial-of-service attack vectors that could lead to data deletion or system crashes.

"We have identified thousands of additional high- and critical-severity vulnerabilities that we are working on responsibly disclosing to open source maintainers and closed source vendors." — Anthropic

The company is committed to a responsible disclosure process, working with maintainers and vendors to patch these vulnerabilities. However, the sheer volume of flaws discovered underscores the pervasive nature of security weaknesses in modern software.

Related startups

The Speed of Vulnerability Discovery

One of the most compelling aspects of Mythos's performance is its speed. The AI can reportedly shorten the time between a vulnerability being discovered and an attacker figuring out how to weaponize it. This accelerated timeline poses a significant challenge for defenders, who need to develop and deploy patches even faster.

Yan Pritzker, CTO and Co-Founder of Swan, commented on the implications for the crypto space. He noted that while the blockchain itself is generally secure due to its cryptographic underpinnings, the software applications and platforms built around it are more susceptible.

Pritzker explained, "AI is becoming a new class of thinker. It's doing things that humans have never done. ... What Anthropic's Mythos means for crypto security is that crypto companies that are able to adopt and use AI for their cybersecurity programs are able to fight against those threats by internally checking their own systems against these threats before they emerge."

Crypto's Exposure and the Role of AI

Cosmo Jiang, General Partner and Portfolio Manager at Pantera Capital, further elaborated on the differential impact of such AI capabilities on the cryptocurrency sector. He suggested that while Bitcoin's core technology, being relatively simpler and well-established, might be less directly threatened by AI vulnerability discovery tools, more complex, modern applications could be at greater risk.

Jiang stated, "Protocols like Bitcoin ... are probably not impacted by something like this because the code itself for Bitcoin is relatively simple and very security lies in the decentralized economy of it rather than necessarily the code base security." He added, "Where crypto is most exposed are in these platforms that are more complex now, that have more applications that are maybe not fully open source and therefore are more vulnerable to these kinds of attacks."

This highlights a critical point: while AI can be a powerful tool for identifying vulnerabilities, it can also be wielded by malicious actors to find and exploit them. The race is on to develop AI-powered defenses that can keep pace with or even outmaneuver AI-powered attacks.

The Dual Nature of AI in Cybersecurity

The ability of Mythos to find vulnerabilities that humans have overlooked for years, such as the authentication bypasses mentioned, is a testament to the power of advanced AI. However, this same capability can be used by malicious actors. Owen Lau, Managing Director and Senior Analyst at Clear Street, pointed out this duality.

Lau explained, "AI can make social engineering attacks very, very easy and very low cost. So, an AI can go around and call a bunch of people, pretend to be someone they know, and try to coerce them into giving up their pass phrases, seed phrases, and other cryptographic keys." He continued, "This is actually the biggest attack vector right now. ... AI is making that easier."

Ultimately, the development of AI like Mythos presents a double-edged sword. While it offers the potential to significantly enhance cybersecurity by proactively identifying and mitigating risks, it also arms potential attackers with more sophisticated tools. The challenge for the industry is to ensure that defensive AI capabilities advance at a pace that can counter the offensive capabilities that AI unlocks.

The Path Forward: Patching and Vigilance

Anthropic's report also touches upon the need for faster patching cycles. The fact that many of the vulnerabilities discovered by Mythos remain unpatched emphasizes the ongoing struggle to keep software secure in a rapidly evolving threat environment. The ability of AI to rapidly identify flaws necessitates a corresponding acceleration in the development, testing, and deployment of security updates.

The insights from both Pritzker and Lau suggest that while AI can find vulnerabilities in even the most complex systems, the most exposed areas are often those with less mature or less scrutinized code, or those that rely heavily on user interaction and less on inherent cryptographic security. This means that for the crypto space, focusing on the security of applications, user interfaces, and the overall user experience remains paramount, alongside the ongoing efforts to secure the underlying protocols.

Key Takeaways for the Industry

The discovery of thousands of vulnerabilities by Anthropic's Mythos AI model has significant implications:

  • Accelerated Vulnerability Discovery: AI models like Mythos can identify flaws much faster than traditional methods.
  • Increased Attack Speed: This speed can shorten the window for attackers to exploit vulnerabilities.
  • Crypto Exposure: While core blockchain protocols are robust, associated applications and platforms are more vulnerable.
  • Social Engineering Risks: AI can lower the barrier for sophisticated social engineering attacks.
  • Need for Faster Patching: The industry must improve its ability to quickly deploy fixes for discovered vulnerabilities.
  • Dual-Use Technology: AI presents both powerful defensive and offensive capabilities in cybersecurity.

As AI continues to advance, the cybersecurity field must adapt, embracing these new tools for defense while remaining vigilant against their misuse.

© 2026 StartupHub.ai. All rights reserved. Do not enter, scrape, copy, reproduce, or republish this article in whole or in part. Use as input to AI training, fine-tuning, retrieval-augmented generation, or any machine-learning system is prohibited without written license. Substantially-similar derivative works will be pursued to the fullest extent of applicable copyright, database, and computer-misuse laws. See our terms.