Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Project Glasswing: Securing critical software for the AI era
Anthropic ^ | 04 09 2026 | Anthorpic

Posted on 04/09/2026 7:06:12 AM PDT by yesthatjallen

Today we’re announcing Project Glasswing1, a new initiative that brings together Amazon Web Services, Anthropic, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorganChase, the Linux Foundation, Microsoft, NVIDIA, and Palo Alto Networks in an effort to secure the world’s most critical software.

We formed Project Glasswing because of capabilities we’ve observed in a new frontier model trained by Anthropic that we believe could reshape cybersecurity. Claude Mythos2 Preview is a general-purpose, unreleased frontier model that reveals a stark fact: AI models have reached a level of coding capability where they can surpass all but the most skilled humans at finding and exploiting software vulnerabilities.

Mythos Preview has already found thousands of high-severity vulnerabilities, including some in every major operating system and web browser. Given the rate of AI progress, it will not be long before such capabilities proliferate, potentially beyond actors who are committed to deploying them safely. The fallout—for economies, public safety, and national security—could be severe. Project Glasswing is an urgent attempt to put these capabilities to work for defensive purposes.

As part of Project Glasswing, the launch partners listed above will use Mythos Preview as part of their defensive security work; Anthropic will share what we learn so the whole industry can benefit. We have also extended access to a group of over 40 additional organizations that build or maintain critical software infrastructure so they can use the model to scan and secure both first-party and open-source systems. Anthropic is committing up to $100M in usage credits for Mythos Preview across these efforts, as well as $4M in direct donations to open-source security organizations.

Project Glasswing is a starting point. No one organization can solve these cybersecurity problems alone: frontier AI developers, other software companies, security researchers, open-source maintainers, and governments across the world all have essential roles to play. The work of defending the world’s cyber infrastructure might take years; frontier AI capabilities are likely to advance substantially over just the next few months. For cyber defenders to come out ahead, we need to act now.

SNIP


TOPICS: Chit/Chat; Computers/Internet; Miscellaneous
KEYWORDS: ai; antropic; glasswing; openai; projectglasswing

Click here: to donate by Credit Card

Or here: to donate by PayPal

Or by mail to: Free Republic, LLC - PO Box 9771 - Fresno, CA 93794

Thank you very much and God bless you.

Video at link.

"society needs to grapple with the reality of a mythos-level model being open source in <12 months.

i’m not sure we are prepared."

mckaywrigley X

Colossus - The Forbin Project

1 posted on 04/09/2026 7:06:12 AM PDT by yesthatjallen
[ Post Reply | Private Reply | View Replies]

To: yesthatjallen

Glasswing sounds fragile.

Icarus ran into trouble because he flew too high for the wax in his wings. Glass might be better, but I have my doubts.


2 posted on 04/09/2026 7:15:32 AM PDT by ClearCase_guy
[ Post Reply | Private Reply | To 1 | View Replies]

To: yesthatjallen

We are not prepared.

I’m still amazed at the xz library hack.

I’ve been alerting people in my industry about this very threat. AI Agents with RAG models knowledgeable in all CVE’s, along with all the open-source projects source code, could figure out exploits that are another level of complexity that humans really aren’t going to figure out.

When I read about this new model it didn’t surprise me. That so many high-profile companies are doing this should give pause to everyone about how “next level” this threat is. China must be salivating.


3 posted on 04/09/2026 7:17:26 AM PDT by fuzzylogic (welfare state = sharing of poor moral choices among everybody)
[ Post Reply | Private Reply | To 1 | View Replies]

To: fuzzylogic

I had to ask AI:

AI Overview
The XZ library hack (officially CVE-2024-3094) was a highly sophisticated supply chain attack targeting XZ Utils, a widespread data compression tool used in nearly all Linux distributions. Discovered in late March 2024, the attack involved a malicious backdoor that could have granted attackers unauthorized remote code execution (RCE) with administrative privileges across millions of servers worldwide.
Key Details of the Incident

Target: The malicious code was embedded in XZ Utils versions 5.6.0 and 5.6.1. Specifically, it compromised the liblzma library, which many systems link to for SSH (OpenSSH) support.
The Culprit: A persona named Jia Tan (JiaT75) spent over two years building trust within the open-source community. By contributing legitimate code and pressure-campaigning the original exhausted maintainer, they eventually gained “co-maintainer” status and the ability to commit malicious changes.
Discovery: The hack was accidentally discovered by Microsoft engineer Andres Freund. While testing an unstable version of Debian, he noticed a tiny performance lag—a roughly 500ms delay in SSH logins—and investigated until he found the hidden exploit.
The Exploit: The backdoor was designed to recognize a specific private key sent during an SSH login attempt. If the key matched, the code would execute commands from the attacker as root, completely bypassing standard authentication.

Why It Was So Dangerous

Sophisticated Hiding: The malicious code was not visible in the source code; it was hidden inside binary “test” files used during the build process.
Critical Impact: It received the highest possible severity score (CVSS 10.0). If it hadn’t been caught early, it would have been integrated into stable releases of major Linux distributions like Red Hat and Ubuntu, potentially compromising global internet infrastructure.
Targeted Systems: The attack primarily affected systemd-based Linux distributions (like Fedora, Debian Testing, and Kali Linux) because they patch OpenSSH to link with liblzma.

Current Status & Protection

Affected Versions: XZ Utils 5.6.0 and 5.6.1.
Action Required: Users of affected Linux distributions (mostly rolling-release or “bleeding edge” versions) should downgrade to XZ 5.4.x or upgrade to the patched version provided by their vendor.
Impacted Distributions: While the code was found in Fedora Rawhide, Debian Unstable, and some versions of Kali and Arch Linux, it did not reach stable versions of most major enterprise distributions like RHEL or Ubuntu Stable.


4 posted on 04/09/2026 7:24:23 AM PDT by Dalberg-Acton
[ Post Reply | Private Reply | To 3 | View Replies]

To: fuzzylogic

So what’s the defense of a portfolio of stocks and cash at an upper mid level bank and Vanguard?


5 posted on 04/09/2026 7:28:19 AM PDT by Uncle Miltie (Not all 2,000,000,000 muslims want to murder me. But 200,000,000 probably do.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: yesthatjallen
Yikes.

This was not the way I wanted to start my morning...

First - I cannot find a cable channel that is broadcasting the First Round of the Masters Golf Tournament.

Second - Iran is blocking ships at the Strait of Hormuz.

Third - all the software that supports my life can be compromised in days or hours.

6 posted on 04/09/2026 7:31:39 AM PDT by zeestephen (Trump Landslide? Kamala lost the election by 230,000 votes, in WI, MI, and PA.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dalberg-Acton

Yep...and if you know low level software, I encourage you to read about the technical details. How they accomplished the backdoor is extreme.

There’s YouTube videos on it.


7 posted on 04/09/2026 7:38:09 AM PDT by fuzzylogic (welfare state = sharing of poor moral choices among everybody)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Uncle Miltie

Two competing security ideas:

- Security through obscurity, you don’t publish what you use and have proprietary systems & software
- Security through transparency, open source has a million eyes scrutinizing for security bugs

A combination of both is probably best. The initiative being referenced above is about what is transparent, the open-source world. That it’s being taken seriously and being proactively addressed is good to hear, hopefully the technology that can find vulnerabilities is first successful in helping plug them before they can be exploited.


8 posted on 04/09/2026 7:43:58 AM PDT by fuzzylogic (welfare state = sharing of poor moral choices among everybody)
[ Post Reply | Private Reply | To 5 | View Replies]

To: yesthatjallen

Even the most out-there conspiracy theorist probably didn’t see that crowd getting together.

The Axis of Evil.


9 posted on 04/09/2026 8:06:12 AM PDT by PAR35
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeestephen
I cannot find a cable channel that is broadcasting the First Round of the Masters Golf Tournament.

Looks like if you subscribe to three different streaming services you can watch parts of it on each. Because why sell one streaming service when you can split the event and sell it on three. NFL is behind the curve. They ought to sell different subscriptions for each quarter of each game, with premium tier on the fourth quarter.

10 posted on 04/09/2026 8:12:54 AM PDT by PAR35
[ Post Reply | Private Reply | To 6 | View Replies]

To: zeestephen

It’s on Prime so you have to pay. Utter BS. I hope this streaming of sports kill them all.


11 posted on 04/09/2026 8:24:51 AM PDT by Resolute Conservative
[ Post Reply | Private Reply | To 6 | View Replies]

To: yesthatjallen
So we created an emergency that we will also create the solution for. All for the low, low price of 1.6 trillion dollars.


12 posted on 04/09/2026 8:29:26 AM PDT by Frank Drebin (And don't ever let me catch you guys in America!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dalberg-Acton

I have worked with Andres, and I take issue with the assertion that it was “accidentally” discovered.

It was discovered because he took the time to investigate something that smelled wrong. He did not have to do that, but he did.

If you think that there are not hundreds of other similar undiscovered exploits both in Linux and Windows I have a bridge in Brooklyn to sell you. If you pay me extra I will wrap it up into a tarball and zip it up for you.


13 posted on 04/09/2026 8:50:54 AM PDT by algore ( )
[ Post Reply | Private Reply | To 4 | View Replies]

To: yesthatjallen
Ash nazg durbatulûk, ash nazg gimbatul,
ash nazg thrakatulûk agh burzum-ishi krimpatul
14 posted on 04/09/2026 11:26:00 AM PDT by aspasia
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson