CSO Online reported this week that Anthropic, the AI company behind the Mythos vulnerability-finding model, has endorsed a decade-old statistical scoring system called EPSS as the primary triage tool for security teams overwhelmed by AI-accelerated bug discovery. EPSS — the Exploit Prediction Scoring System — is a machine-learning model that processes real-world exploitation data and publishes a probability score for every known vulnerability, called a CVE, each day, telling teams which bugs are most likely to be weaponized in the next 30 days. It is free, open, and already built into more than 120 security products including CrowdStrike, Cisco, Palo Alto Networks, Qualys, and Tenable. The endorsement matters most for what it reveals: even frontier AI cannot reliably predict which vulnerabilities will be exploited without signal from a government-maintained catalog of known-exploited bugs.
The government's catalog is the KEV list, maintained by the Cybersecurity and Infrastructure Security Agency. Anthropic told security teams to patch KEV first, then apply an EPSS probability threshold, to "turn thousands of open CVEs into a manageable queue," according to the company's blog post. The company did not say: let the AI tell you what matters. It said: let the government catalog and a statistical scoring model tell you what matters, and then act. That is an admission — wrapped in a practical recommendation — about the limits of autonomous vulnerability scoring.
The mean time to exploit a vulnerability after disclosure will reach one hour this year and collapse to one minute by 2028, down from 2.3 years in 2018, according to the Zero Day Clock, which tracks exploitation data across more than 83,000 known vulnerabilities. NIST, the National Institute of Standards and Technology, has acknowledged it cannot enrich all new vulnerability entries with human-reviewed severity scores through its National Vulnerability Database — the process is too slow. Anthropic is pointing teams to KEV and EPSS for the same reason: historical exploitation data is the clearest available signal of which bugs are actually being weaponized right now, not a prediction.
Ramy Houssaini, chief cyber solutions officer at Cloudflare, told CSO Online that both CVSS and EPSS are "fundamentally outdated in the Mythos era." The argument: AI has compressed time-to-exploit into minutes, and waiting for a predictive score to prioritize human-speed patching is no longer viable. EPSS covers only CVEs — the standardized identifiers — while AI models like Mythos are already discovering vulnerabilities that do not fit that enumeration system at all. A model may find a misconfiguration in one company's AWS setup and a memory safety issue in another company's legacy C codebase. Triage for those findings requires local models trained on each environment, not a global probability score updated daily.
The reason EPSS cannot solve the local-context problem is structural. It knows a great deal about attacker behavior across the internet. It does not know what is running in a specific organization's environment, which assets matter most to the business, what controls are already in place, or where remediation carries operational risk. Empirical Security's research blog puts it this way: "What it does not know is your environment." Michael Roytman, co-founder and CTO of Empirical Security and one of the original EPSS authors, frames the core problem differently. "The hard problem is not scoring CVEs," he said. "It is applying local context."
Anthropic's own numbers illustrate the scale of what is coming. Its Mythos model scores 83.1 percent on cybersecurity vulnerability reproduction benchmarks — outperforming the next best AI model by more than 16 percentage points. That benchmark performance is what is about to flood the system. The non-CVE exposure problem — vulnerabilities that have no common identifier across applications and cloud environments — may be the bigger long-term story. But the immediate question, which of your known vulnerabilities will actually be weaponized, is already urgent. Until it is answerable at machine speed, the teams running yesterday's vulnerability management process will keep losing to a clock that is not waiting for them.
Anthropic's security guidance was published April 10, 2026. Project Glasswing and the Mythos Preview technical blog post were published April 7, 2026. Empirical Security's analysis of EPSS was published April 17, 2026. NIST's National Vulnerability Database announcement was made in April 2026. CSO Online published its report on April 22, 2026.