Anthropic withholds Mythos Preview model because its hacking is too powerful

5 min read Original article ↗

Anthropic is rolling out a preview of its new Mythos model only to a handpicked group of tech and cybersecurity companies over concerns about its ability to find and exploit security flaws, the company said Tuesday.

Why it matters: Anthropic is so worried about the damage Mythos could cause that it's refusing to release it publicly until there are safeguards to control its most dangerous capabilities.

Threat level: Mythos Preview is "extremely autonomous" and has sophisticated reasoning capabilities that give it the skills of an advanced security researcher, Logan Graham, head of Anthropic's frontier red team, told Axios.

Zoom in: In testing, Mythos Preview found bugs in "every major operating system and web browser," according to a blog post, including some that are believed to be decades old and weren't detected by repeated human-run security tests.

Yes, but: It's only a matter of months — as soon as six months or as far out as 18 — until other AI companies release models with powers similar to the Mythos Preview, Graham said.

Driving the news: Anthropic is opting to roll out Mythos Preview to more than 40 organizations that will use the model to scan and secure their own code and open-source systems.

Flashback: AI models have already given malicious hackers a boost in their attacks.

The intrigue: Anthropic has also been briefing the Cybersecurity and Infrastructure Security Agency, the Commerce Department and " a broader array of actors" on the potential risks and benefits of Mythos Preview, a company official told Axios.

Reality check: Mythos was widely hyped after Axios and others reported on its frightening capabilities, but Graham noted that the company never formally planned to make this version generally available.

What we're watching: Anthropic said in a blog post that the company's goal is to one day "enable our users to safely deploy Mythos-class models at scale," including for general use cases beyond cybersecurity.

Go deeper: The Big One: The cyberattack scenarios that keep officials up at night

Update: This story was updated with the news of a model similar to mythos.