Hackers breached Claude Mythos. That's the news. Anthropic says its AI is too dangerous to release. Apparently the company couldn't keep the system itself secure.
If confirmed, it would be an unusually pointed irony: the company that built the world's most capable cyberattack AI, then said it was too dangerous to release precisely because of that capability, apparently couldn't keep the system itself secure. The breach is days old. The claim it undermines is not.
When Anthropic published its Mythos Preview announcement two weeks ago, it released a detailed accounting of what the model could do: find thousands of zero-day vulnerabilities across every major operating system and browser, chain them into working exploits autonomously, operate faster than any human security team. The company briefed the White House. Treasury Secretary Scott Bessent and Fed Chair Jerome Powell walked bank CEOs through the downside scenario. Dario Amodei published the risks in full.
What Anthropic did not mention was that the same vulnerabilities were already findable by other means. Security company Aisle replicated the critical findings Anthropic described using older, cheaper, publicly available models — a result relayed by cybersecurity researcher Bruce Schneier on his blog. The gap between Mythos and what a determined adversary could already purchase on the open market may be narrower than the "too dangerous" framing suggests. Mythos represents a genuine advance in autonomous exploit-chaining and speed, but the singularity claim — that only a frontier lab with exclusive access can find these bugs — has a qualification attached.
The timing of the announcement served interests beyond safety. Anthropic disclosed $30 billion in annualized revenue run rate last week, up from $9 billion at the end of 2025. The number of customers spending more than $1 million annually crossed 1,000, doubling in under two months. Bloomberg has reported the company is preparing for an IPO as early as October. Project Glasswing — the consortium of twelve partners including Amazon, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorgan, Microsoft, Nvidia, Palo Alto Networks, and the Linux Foundation, plus more than 40 additional organizations — is exactly the kind of high-profile, government-adjacent program that burnishes a public offering narrative. It demonstrates seriousness. It demonstrates scale.
Anthropic committed up to $100 million in usage credits for Glasswing participants and $4 million in donations to open-source security organizations. The 45-day coordinated disclosure window is designed to give software maintainers time to patch before technical details go public. Jim Zemlin, CEO of the Linux Foundation, called it a credible path to changing the equation for open-source security, which has historically been underfunded relative to the software it maintains. But Bruce Schneier called Glasswing ultimately reactive — racing to patch holes before attackers adapt, rather than preventing the race from happening. The volume of findings — thousands of zero-days across every major platform — will test even a well-designed triage pipeline. The premise depends on defenders staying ahead through a head start, an assumption that erodes as the same capabilities proliferate through other channels.
What the Glasswing announcement sidesteps is that the head start may already be gone. If Aisle's findings hold, the vulnerabilities Mythos found are not uniquely accessible to a frontier lab. They are accessible to anyone with a mid-range cloud budget and a few weeks. Richard Whaling, lead researcher at cybersecurity startup Charlemagne Labs, offered a complementary explanation for why Mythos is not shipping: the model is reportedly many times larger than Claude Opus, and serving it profitably at market prices may not be possible with the GPU compute available. The "too dangerous" framing and the "too expensive" reality may describe the same constraint from different angles.
The clearest summary of where Anthropic stands may be the one it has tried hardest not to say out loud: the model is too dangerous to release, too expensive to serve at scale, and the timing of the announcement served a commercial purpose that had nothing to do with safety. None of those three facts contradict each other. They describe the same company from different angles. The question is whether the market prices the philosophy or the constraints.
What comes next: the Euronews breach report is unconfirmed, and Anthropic has not commented publicly on it. Whether the company confirms — and how it characterizes what was taken, if anything — will test whether the transparency posture holds under the one condition that matters: an actual incident. Watch for whether the Linux Foundation's open-source disclosure program produces verifiable patches in the 45-day window, and whether any of the twelve Glasswing partners cite Mythos-derived findings in their own security advisories. Separately, a source familiar with the matter told Euronews that the breach involved access to internal evaluation infrastructure — not just the model weights themselves — which would place the compromise closer to Anthropic's testing environment than its deployment pipeline. The IPO timeline will clarify how much of the Glasswing narrative survives contact with public markets.