
TL;DR
Anthropic's Project Glasswing update is a useful signal for developer teams: AI can find vulnerability candidates faster than humans can verify, disclose, patch, and ship them.
Read next
A practical security playbook for running Codex cloud tasks safely in 2026 using OpenAI docs: internet access controls, domain allowlists, HTTP method limits, and review workflows.
10 min readAI coding agents are submitting pull requests to open source repos - and some CONTRIBUTING.md files now contain prompt injections targeting them.
3 min readGitHub is filling with multi-agent frameworks, skills, and coding harnesses. The useful lesson is not that every team needs a swarm. It is that every agent needs receipts: tests, logs, diffs, and reviewable checkpoints.
8 min readAnthropic's Project Glasswing update is not just a cyber story. It is a developer workflow story.
The headline number is large: Anthropic says Claude Mythos Preview and roughly 50 partners found more than ten thousand high- or critical-severity vulnerabilities. The more useful sentence is quieter: progress used to be limited by finding vulnerabilities, and is now limited by verification, disclosure, patch design, and deployment.
That is the category shift.
We already know coding agents can produce more code than teams can review. Now security agents are starting to produce more findings than maintainers can process. The same lesson from agent swarms needing receipts applies to security: throughput without triage discipline creates a queue, not safety.
Anthropic says Project Glasswing partners have found hundreds of high- or critical-severity issues each, and that Cloudflare found 2,000 bugs across critical-path systems, including 400 high- or critical-severity findings. Anthropic also says it scanned more than 1,000 open-source projects and estimated 6,202 high- or critical-severity vulnerabilities.
The important nuance is that these are not all equally confirmed.
Anthropic reports that 1,752 high- or critical-rated open-source findings were assessed by external security research firms or Anthropic, with 90.6% proving to be valid true positives and 62.4% confirmed as high or critical severity. That is strong signal, but it still leaves a large operational gap between "model found something" and "users are safer."
The HN discussion around the post went straight to that gap. Commenters asked whether the numbers represented suspected or actual vulnerabilities, whether other frontier models plus a coordinated program could produce similar results, and whether withheld model access makes the evidence hard to reproduce. That skepticism is healthy.
The right response is not to dismiss the results. It is to separate three steps:
AI is improving step one fastest. Most organizations are still weak at steps two and three.
Get the weekly deep dive
Tutorials on Claude Code, AI agents, and dev tools - delivered free every week.
From the archive
May 23, 2026 • 7 min read
May 23, 2026 • 8 min read
May 21, 2026 • 7 min read
May 20, 2026 • 7 min read
Anthropic says maintainers are capacity constrained, some have asked them to slow disclosures, and a high- or critical-severity bug found by Mythos Preview takes about two weeks to patch on average. It also says only 75 of the 530 reported high- or critical-severity bugs had been patched at the time of the update.
That is not a failure of the model. It is a reminder that software security is a system.
If AI security scanning becomes cheap, every serious engineering organization needs a finding intake lane:
That is less exciting than a model demo, but it is where the risk gets reduced.
This is the same operational shape as Codex cloud security: the model can work faster, so the policy and review path has to become more explicit.
Maintainers already deal with low-quality AI-generated reports. Anthropic explicitly calls that out. This is the part developer teams should internalize.
A vulnerability report from an AI system should not arrive as a confident paragraph. It should arrive as a compact packet:
Without that packet, AI security tooling can make maintainers slower. A scanner that emits plausible but under-specified findings transfers work to the human queue.
The practical bar should be close to a pull request. If the agent cannot reproduce the bug, isolate the impacted path, and explain the fix boundary, the finding should be labeled as unverified triage input.
Do not wait for Mythos-class models to be broadly available before changing your workflow.
Start with generally available tools and process:
This is also where prompt injection and secrets handling stop being abstract topics. If a security agent can inspect your repo, run tools, fetch dependencies, and propose patches, it needs scoped credentials, logs, and review just like any other agent.
The bullish take is that AI security agents can help defenders finally get ahead of bug discovery.
The skeptical take is that they can flood maintainers with more work, unverifiable claims, and disclosure pressure.
Both can be true.
The winning teams will treat AI security scanning as a triage pipeline, not a magic scanner. The model finds candidates. The system validates, patches, and ships. Until that second half is real, the bottleneck has only moved.
Technical content at the intersection of AI and development. Building with AI agents, Claude Code, and modern dev tools - then showing you exactly how it works.
CDN, DNS, DDoS protection, and edge computing. Free tier handles most needs. This site uses Cloudflare for DNS and analy...
View ToolLargest MCP server directory with 17,000+ servers. Security grading (A/B/C/F), compatibility scoring, and install config...
View ToolA complete, citation-backed Claude Code course with setup, prompting systems, MCP, CI, security, cost controls, and capstone workflows.
ai-developmentSet up Codex Chronicle on macOS, manage permissions, and understand privacy, security, and troubleshooting.
Getting StartedThe primary command-line entry point for Claude Code sessions.
Claude Code
A practical security playbook for running Codex cloud tasks safely in 2026 using OpenAI docs: internet access controls,...

AI coding agents are submitting pull requests to open source repos - and some CONTRIBUTING.md files now contain prompt i...

GitHub is filling with multi-agent frameworks, skills, and coding harnesses. The useful lesson is not that every team ne...

Master tool use in the Claude API. Schema design, retry logic, multi-step loops, and the failure modes that only show up...

A long-running coding agent is only useful if the environment around it can queue tasks, capture logs, checkpoint state,...

Runtime's Launch HN thread is a useful signal: teams do not just want isolated coding agents. They want a control plane...

New tutorials, open-source projects, and deep dives on coding agents - delivered weekly.