Claude Mythos finds 271 vulnerabilities in Firefox, defenders may have a decisive advantage

MarketWhisper

Firefox安全漏洞

Mozilla announced on Tuesday that an early version of Anthropic’s Claude Mythos AI model, during internal testing, identified 271 security vulnerabilities in the Firefox browser, and all of them were patched within this week. While Mozilla said it was also surprised by the findings, it noted that the results suggest a fundamental shift may be underway in the cybersecurity landscape, and that defenders may be about to shrink attackers’ advantage—one that they have held for years.

From 22 to 271: Claude Mythos’s security capability leap

Mozilla previously tested another Anthropic model that, in an earlier version of Firefox, identified 22 security-sensitive vulnerabilities. The discovery of 271 vulnerabilities this time represents a major jump in scale.

Mozilla emphasized that all vulnerabilities found by the system could be found even by “top human researchers,” and that AI tools have not yet revealed entirely new categories of vulnerabilities that humans can’t understand. Its core advantage is that it greatly speeds up this process, enabling developers to quickly identify issues before attackers can exploit them.

Claude Mythos was released in March 2026. It is Anthropic’s most advanced model to date, and company internal materials describe it as a new model that goes beyond the earlier Opus series. In pre-release testing, it found thousands of previously unknown vulnerabilities across major operating systems and web browsers.

Project Glasswing: Why access is tightly controlled

Anthropic provides limited access to Claude Mythos through its “Glasswing Program” (Project Glasswing). The organizations currently approved to use it are limited to specific vetted technology companies such as Amazon, Apple, and Microsoft, with use cases restricted to software vulnerability scanning.

The rationale behind this strict control is as follows: testing by a UK AI safety research institute found that Claude Mythos can autonomously carry out complex web operations, including multi-stage enterprise network attack simulations without any human intervention. According to people familiar with the matter, even though the Trump administration had called for a halt to the use of Anthropic’s technology, the U.S. National Security Agency (NSA) has deployed and is running a preview version of Claude Mythos on classified networks.

A double-edged sword: The same capabilities can accelerate cyberattacks

The results Mozilla found have far-reaching implications on both sides. Security researchers warn that AI systems that can analyze code at scale can automatically identify exploitable vulnerabilities in widely used software. If it falls into the hands of bad actors, it will create an unprecedented cybersecurity threat for software companies and users—and may even give rise to a new generation of automated cyberattack forms.

Frequently Asked Questions

What types of issues are the 271 vulnerabilities Claude Mythos found in Firefox?

According to Mozilla, these are real security-sensitive vulnerabilities that “even top human researchers” can find. Mozilla said AI tools have not yet revealed entirely new categories of vulnerabilities that humans can’t understand. However, their advantage lies in how far faster they can conduct large-scale systematic scanning than manual review, and all issues have been fully fixed within this week.

What is the purpose of the Glasswing Program, and which organizations can use Claude Mythos?

The Glasswing Program is Anthropic’s controlled-access program. Currently, only a limited number of vetted technology companies such as Amazon, Apple, and Microsoft are allowed to use Claude Mythos for limited purposes, with use restricted to software security vulnerability scanning. This restriction reflects Anthropic’s high level of caution about the dual-use risks of the model.

What are the broader, far-reaching implications of this discovery for the cybersecurity industry as a whole?

Mozilla said the emergence of AI tools may give defenders, for the first time, an opportunity to shrink attackers’ long-held advantage and achieve “decisive victory.” However, researchers also warn that the same capabilities can be used by attackers as well, accelerating the scale and efficiency of automated cyberattacks. Therefore, controlling access to AI security tools is crucial.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Microsoft Unveils AI Agent Commerce Infrastructure: Publisher Marketplace, Merchant Protocols, and Ad Tools

Gate News message, April 22 — Microsoft's AI monetization vice president Tim Frank announced a suite of commercial infrastructure updates designed for the "agentic web" era, enabling publishers, merchants, and advertisers to remain discoverable and tradable as AI agents make purchasing decisions on

GateNews10m ago

NeoCognition Raises $40M in Seed Funding for On-the-Job Learning AI Agents

Gate News message, April 22 — AI research lab NeoCognition announced the completion of a $40 million seed round, emerging from stealth mode. Founded by Ohio State University Associate Professor Yu Su, along with Xiang Deng and Yu Gu, the company is headquartered in Palo Alto, California. The round w

GateNews26m ago

Vitalik: Post-Quantum Cryptography Solutions Are Mature; Ethereum Aims to Resist Both Quantum and AI Threats

Gate News message, April 22 — Vitalik Buterin stated in a dialogue with Xiao Feng that mature post-quantum cryptography solutions already exist, expressing a preference for the GeoHash algorithm. He noted that Ethereum's vision extends beyond merely becoming a post-quantum chain—the network also

GateNews38m ago

Sam Altman Details Failed Negotiations with Elon Musk Over OpenAI Control, Lawsuit Set for April 27

Altman on Core Memory recounts failed OpenAI governance talks with Elon Musk: stages of compromise toward a for-profit model, Musk's demands for majority stake and CEO control, Altman opposing absolute power, with trial looming. Abstract: Sam Altman details, on Core Memory, failed negotiations with Elon Musk over OpenAI governance, outlining moves toward a for-profit model, Musk's demands for majority stake and CEO authority, and Altman's rejection of absolute control; the litigation looming with a trial set for April 27.

GateNews46m ago

OpenAI's GPT-5.4 Pro Solves New Erdős Problem; Brockman Teases Writing Model Improvements

Brockman cites GPT-5.4 Pro solving a new Erdős problem as proof of sudden model leaps, and OpenAI hints at personalized writing advances while noting existing gaps in 'soul' and a forthcoming model. Abstract: The piece reports two OpenAI disclosures from the Core Memory podcast: a GPT-5.4 Pro milestone solving an Erdős problem, signaling rapid capability gains with broad implications; and OpenAI's plan for a new model to deliver more personalized, soulful writing, addressing critiques of LLM subjectivity.

GateNews50m ago

Sam Altman Responds to Home Attacks in Podcast, Predicts More Similar Incidents

Gate News message, April 22 — Sam Altman, CEO of OpenAI, has publicly responded to two attacks on his residence for the first time during a Core Memory podcast appearance. Altman stated that similar incidents are likely to occur in the future, though he did not elaborate on the details of the attack

GateNews58m ago
Comment
0/400
No comments