Anthropic on Tuesday said its yet-to-be-released artificial intelligence model called Claude Mythos has proven keenly adept at exposing software weaknesses.
Mythos has laid bare thousands of vulnerabilities in commonly used applications for which no patch or fix exists, prompting the San Francisco-based AI startup to form an alliance with cybersecurity specialists to bolster defenses against hacking.
kAmQ(6 92G6 2 ?6H >@56= E92E H6VC6 6IA=:4:E=J ?@E C6=62D:?8 E@ E96 AF3=:4[Q |:<6 zC:686C @7 p?E9C@A:4 {23D D2:5 2E 2 wF>2?) px 4@?76C6?46 :? $2? uC2?4:D4@]k^Am
kAmx?DE625[ p?E9C@A:4 :D =6EE:?8 4J36CD64FC:EJ DA64:2=:DED 2?5 6?8:?66CD :? E96 @A6?\D@FC46 4@>>F?:EJ H@C< H:E9 |JE9@D E@ FD6 E96 >@56= 2D 2 5676?D:G6 H62A@? QD@CE @7 2C>:?8 E96> 29625 @7 E:>6[Q zC:686C 6IA=2:?65]k^Am
kAm{62AD :? px >@56= 42A23:=:E:6D 92G6 4@>6 H:E9 4@?46C?D 23@FE 924<6CD FD:?8 DF49 E@@=D 7@C 7:8FC:?8 @FE A2DDH@C5D @C 4C24<:?8 6?4CJAE:@? >62?E E@ <66A 52E2 D276]k^Am
kAm%96 @=56DE @7 E96 GF=?6C23:=:E:6D F?4@G6C65 3J |JE9@D 52E6D 324< af J62CD[ 2?5 ?@?6 H6C6 @DE6?D:3=J ?@E:465 3J E96:C >2<6CD 367@C6 36:?8 A:?A@:?E65 3J E96 px >@56=[ 244@C5:?8 E@ p?E9C@A:4]k^Am
kAm|JE9@D :D E96 =2E6DE 86?6C2E:@? @7 p?E9C@A:4VD r=2F56 72>:=J @7 px[ 2?5 2 C646?E =62< @7 D@>6 @7 :ED 4@56 AC@>AE65 E96 DE2CEFA E@ C6=62D6 2 3=@8 A@DE H2C?:?8 :E A@D65 F?AC64656?E65 4J36CD64FC:EJ C:D<D]k^Am
kAmQpx >@56=D 92G6 C624965 2 =6G6= @7 4@5:?8 42A23:=:EJ H96C6 E96J 42? DFCA2DD 2== 3FE E96 >@DE D<:==65 9F>2?D 2E 7:?5:?8 2?5 6IA=@:E:?8 D@7EH2C6 GF=?6C23:=:E:6D[Q p?E9C@A:4 D2:5 :? 2 3=@8 A@DE]k^Am
kAmQ%96 72==@FE \\ 7@C 64@?@>:6D[ AF3=:4 D276EJ[ 2?5 ?2E:@?2= D64FC:EJ \\ 4@F=5 36 D6G6C6]Qk^Am
kAm$@7EH2C6 GF=?6C23:=:E:6D 6IA@D65 3J |JE9@D H6C6 @7E6? DF3E=6 2?5 5:77:4F=E E@ 56E64E H:E9@FE px[ 244@C5:?8 E@ p?E9C@A:4]k^Am
kAmpD 2? 6I2>A=6[ :E D2:5 |JE9@D 7@F?5 2 AC6G:@FD=J F??@E:465 7=2H :? G:56@ D@7EH2C6 E92E 925 366? E6DE65 >@C6 E92? d >:==:@? E:>6D 3J :ED 4C62E@CD]k^Am
k9am\ !C@;64E v=2DDH:?8 \k^9am
kAmpD 2 AC642FE:@?[ p?E9C@A:4 92D D92C65Â 2 G6CD:@? @7 |JE9@D H:E9 4J36CD64FC:EJ 4@>A2?:6D rC@H5$EC:<6 2?5 !2=@ p=E@ }6EH@C<D[ 2D H6== 2D H:E9 p>2K@?[ pAA=6 2?5 |:4C@D@7E :? 2 AC@;64E :E 5F3365 Qv=2DDH:?8]Qk^Am
kAm}6EH@C<:?8 8:2?ED r:D4@ 2?5 qC@254@> 2C6 E2<:?8 A2CE :? E96 AC@;64E[ 2=@?8 H:E9 E96 {:?FI u@F?52E:@? E92E AC@>@E6D E96 7C66[ @A6?\D@FC46 {:?FI 4@>AFE6C @A6C2E:?8 DJDE6>]k^Am
kAmQ%9:D H@C< :D E@@ :>A@CE2?E 2?5 E@@ FC86?E E@ 5@ 2=@?6[Q r:D4@ 49:67 D64FC:EJ 2?5 ECFDE @77:46C p?E9@?J vC:64@ D2:5 :? 2 ;@:?E C6=62D6 23@FE v=2DDH:?8]k^Am
kAmQpx 42A23:=:E:6D 92G6 4C@DD65 2 E9C6D9@=5 E92E 7F?52>6?E2==J 492?86D E96 FC86?4J C6BF:C65 E@ AC@E64E 4C:E:42= :?7C2DECF4EFC6 7C@> 4J36C E9C62ED[ 2?5 E96C6 :D ?@ 8@:?8 324<]Qk^Am
kAmpAAC@I:>2E6=J c_ @C82?:K2E:@?D :?G@=G65 :? E96 56D:8?[ >2:?E6?2?46 @C @A6C2E:@? @7 4@>AFE6C DJDE6>D 2C6 D2:5 E@ 92G6 ;@:?65 v=2DDH:?8]k^Am
kAm!C@;64E A2CE?6CD 2C6 E@ D92C6 E96:C |JE9@D 7:?5:?8D[ 244@C5:?8 E@ p?E9C@A:4[ H9:49 :D AC@G:5:?8 23@FE S`__ >:==:@? H@CE9 @7 4@>AFE:?8 C6D@FC46D 7@C E96 >:DD:@?]k^Am
kAmt2C=J H@C< H:E9 px >@56=D 92D D9@H? E96J 42? 96=A 7:?5 2?5 7:I D@7EH2C6 2?5 92C5H2C6 GF=?6C23:=:E:6D 2E 2 A246 2?5 D42=6 ?@E AC6G:@FD=J A@DD:3=6[ 244@C5:?8 E@ vC:64@]k^Am
kAmQ%96 H:?5@H 36EH66? 2 GF=?6C23:=:EJ 36:?8 5:D4@G6C65 2?5 36:?8 6IA=@:E65 3J 2? 25G6CD2CJ 92D 4@==2AD65 \\ H92E @?46 E@@< >@?E9D ?@H 92AA6?D :? >:?FE6D H:E9 px[Q D2:5 rC@H5DEC:< 49:67 E649?@=@8J @77:46C t=:2 +2:ED6G]k^Am
kAmQr=2F56 |JE9@D !C6G:6H 56>@?DEC2E6D H92E :D ?@H A@DD:3=6 7@C 5676?56CD 2E D42=6[ 2?5 25G6CD2C:6D H:== :?6G:E23=J =@@< E@ 6IA=@:E E96 D2>6 42A23:=:E:6D]Qk^Am
kAmp?E9C@A:4 D2:5 :E 92D 925 5:D4FDD:@?D H:E9 E96 &$ 8@G6C?>6?E C682C5:?8 |JE9@D 56DA:E6 2 564C66 3J E96 (9:E6 w@FD6 :? u63CF2CJ E@ E6C>:?2E6 2== 4@?EC24ED H:E9 E96 DE2CEFA]k^Am
kAm%92E 5:C64E:G6 H2D AFE @? 9@=5 3J 2 7656C2= 4@FCE ;F586 H9:=6 2 =682= 492==6?86 3J p?E9C@A:4 H@C<D :ED H2J E9C@F89 E96 4@FCED]k^Am
kAmEF\3=\84^;84k^Am