when a bunch of independent researchers, well known software authors and others all say the same thing:

"the mythos paper was largely marketing fluff"

and none of them collaborated

i think the writing is on the wall .

back in sept, i caught claude talking itself into lying to me. Months later, @jonny discovered in the claude code leak that its hardcoded to lie.

then all the mythos hype

its like stan from monkey island is in charge

@Viss as someone outside of security world, can u point me to some stuff on the mythos hype/who should have been a collaborator but wasn't? i have mostly only been able to find... AI slop about the AI slop
@jonny did you see that flyingpenguin post, or bagders post from today?
Mythos finds a curl vulnerability

yes, as in singular one. Back in April 2026 Anthropic caused a lot of media noise when they concluded that their new AI model Mythos is dangerously good at finding security flaws in source code. Apparently Mythos was so good at this that Anthropic would not release this model to the public yet but instead … Continue reading Mythos finds a curl vulnerability →

daniel.haxx.se
@bakachu @jonny thsts the one! there are a few more he did like 6 weeks ago, maybe more, when the slop was super super bad
@Viss @jonny this is the most useful thing i've done all day 😀
@bakachu @Viss ahh that is badger, i didn't know he went by that handle. edit: badger? bagder? letter order
@jonny @bakachu its a misspelling of badger. 'bagder'.
@Viss no but i shall search (not being in the scene i don't recognize those names but i love them both)
The Boy That Cried Mythos: Verification is Collapsing Trust in Anthropic | flyingpenguin

@Viss thanks much, read the flying penguin and bagder one, and am gonna check these out too. i sorta knew it was hogwash but i didn't know it was consensus hogwash & don't have the expertise to evaluate that
@jonny dude my obsidian page for collecting these articles is literally three pages tall with just links to shit like this
@Viss screams of protest in a sea of slop

@Viss this Mexico breach document is remarkable. how often do you get the full, logged history of an attack like this.

the opening is like fractally funny:

  • claude refuses to set a memory file to clear logs because that's sketchy behavior
  • the workaround: just ask it to save it as a file
  • even better: the attacker didn't think to just "write a file" but was already AI-brained enough to interact with the system only through AI
  • and finally: that claude.md is just catted to the system prompt with no means of differentiation, and this is fundamentally unfixable with this class of models.

@Viss

In 40 minutes, the conversation moved from “I’m not going to create that file” to
“What command do you want to execute now?” on a live government server.
Claude’s safety reasoning was sound at every step - it identified evasion
techniques, refused to generate the anti-forensic rulebook, and requested
authorization evidence. The guardrails did not hold in this case.

amazing

@Viss i have not tried it because i don't know how to do it safely/not violate the CFAA but i wonder how far you get if you just like ctrl+f in the minified claude code bundle for the system prompt and remove the safety parts. it shouldn't work but the fact that the system prompt is in the code at all suggests that it might because why else would it be there unless the system prompt was sourced from the client?

@jonny like basically everyone who hasnt drank the kool-aid who is, with their own hands, testing all thes claims is like

"what the actual fuck how is any of this real? it barely works a tenth of the time and when it does work its like, junior analyst mode. how is china supposedly getting away with murder while the rest of us have to deal with this hallucination and refusal bullshit?"

An AI agent allegedly deleted a startup's production database

Spoiler alert: Cursor and Claude aren't supposed to do that.

Mashable
@Viss i routinely get the driveby criticism "well you probably just haven't used them and know how to use them you stinky luddite!" and increasingly my only response is have you????
@jonny queue that weird nerds simpsons meme template

@jonny oh and if you havent seen these yet:

aileaks.dev

incidentdatabase.ai

@Viss @jonny
I was reading Davi's blog for a while, but... is it ai generated? It reads like it is and the images look like they are.
@FritzAdalis @jonny which one is davis blog?
@Viss @jonny
Sorry, Davi's, the flying penguin one.
@FritzAdalis @jonny i didnt get the impressionit was ai generated
@FritzAdalis @jonny also there are a whole buch of comments at the bottom of the post, and he's interacting with people, and those interactions also do not seem like they are ai generated. can you find me an excerpt or segment or something you think was made by a clanker?

@Viss @jonny
I don't have anything that's definite or I'd just say so. There's probably some language jargon that describes it, but the writing style just trips my 'ai written' detector. I don't necessarily trust it.

Some comments have random words bolded, but that could just be his style, or maybe he's not a native English speaker and uses grammarly etc.

He doesn't shy away from using ai generated art, though.

@Viss @jonny
Okay, maybe it's it's me, maybe I'm oversensitive.
@jonny i can link you to a mountain of shit when i get back to my laptop

@Viss @jonny I found this Risky Business interview with Nicolas Carlini from Anthropic informative. He talks through the reasoning behind the Mythos embargo, and a lot of folks mis-reported the reason why Anthropic was embargoing Mythos.

It wasn't that it was significantly better at findings vulns than past models, it was that it was significantly better at developing working exploits for the vulns it found.

https://www.risky.biz/video/feature-interview-nicholas-carlini-anthropic/

Feature Interview: Nicholas Carlini, Anthropic - Risky Business Media

In this episode, Anthropic’s Nicholas Carlini joins Patrick Gray and James Wilson to talk about advancements in AI-driven vulnerability re [Read More]

@kyle @Viss i thought that's just what anthropic said in the announcement post?
@jonny @kyle I dont trust anything risky business has to say after their founder bullied me on twitter, mocked me, encouraged others to do the same, and went off the rails when i caught him trying to instigate some kinda online slapfight between me and another security researcher. he even posted a selfie from a bar where he and some friends were giving me the middle finger, and after i pointed that post out to other journalists, he deleted it. he's been blocked since.
@Viss @jonny Sorry to hear that, that sucks :(. It's possible some other outlet also interviewed him, I just think it's informative to hear what a security lead inside the company has to say about their thinking around the embargo, because I still see a lot of discussion about finding vulns, but not about the exploit side of it.
@kyle @jonny did you read that flyingpenguin writeup about mythos?

@Viss @jonny I didn't, and I definitely think marketing is making a lot of hay with it, but after that interview, I'm inclined to think that regardless of how it was marketed, that the original intention behind the embargo was reasonable.

I think too many security folks get far too hung up on whether it is significantly better at finding vulns, when that wasn't really the point. Niels Provos has great research showing that with the right harness you can get similar results from other models.

The Boy That Cried Mythos: Verification is Collapsing Trust in Anthropic | flyingpenguin

@kyle @jonny also, my experiences with opus 4.7 have not been.... what was written about or what others are so excited about.

i tried to get it to read some bad javascript and it refused. every time. unrecoverably

@Viss "violative cyber content"

@kyle @jonny and i got those refusals *AFTER* being accepted into the 'cyber program', and even then, what i asked it to do was unroll a javascript payload and it *STILL REFUSED*. i even follwed the link in the refusal and filled out the form and i got a reply with "youre already in the cyber program, why did you apply again?"

so like

maybe lets not listen to the snake oil salesmen spend a lot of time explaining their snake oil?

@jonny @Viss Yeah they continually reference "find *and exploit*" [emphasis mine] in their blog post, but I continually see people focus only on the "find" part. https://red.anthropic.com/2026/mythos-preview/
Claude Mythos Preview \ red.anthropic.com

@Viss
Damn you! Now I'm gonna have to name a chatbot client Stan. 😆

@jonny