Iconos SCW
héroe bg sin separador
Blog

The Agentic Era Arrived Early. Don’t Get Caught Off Guard by Late AI Governance.

Doctor Matias Madou
Published Apr 10, 2026
Last updated on Apr 10, 2026

While these seismic shifts in software development and security seem to be regular occurrences in 2026, the arrival of Anthropic's latest, reportedly "most dangerous" AI coding model yet, Claude Mythos, represents a permanent, fundamental shift in how every security leader must approach their security program, especially with patch management of legacy systems.

Most enterprises are still navigating the shift from human-written code to AI-assisted development, ushering in new processes, learning to review what their AI co-pilots generate, building new skills, and establishing new guardrails around appropriate enterprise use.

But, the next phase of AI-driven software creation didn't wait.

This week, Anthropic published a detailed technical assessment of Claude Mythos Preview, a new frontier AI model with a capability that should stop every security and engineering leader in their tracks. It can autonomously identify and exploit zero-day vulnerabilities across all major operating systems and browsers, without human intervention after an initial prompt. Engineers with no formal security training directed the model overnight and woke up to complete, working exploits.

These findings are startling and not theoretical. Mythos Preview found a 27-year-old vulnerability in OpenBSD, one of the most security-hardened operating systems in the world, that allowed an attacker to remotely crash any machine just by connecting to it. It discovered a 16-year-old flaw in FFmpeg that automated testing tools had hit five million times without catching. It chained together multiple Linux kernel vulnerabilities autonomously to achieve full machine control. These weren't human-assisted discoveries; no real-world practitioner guided the process after the initial prompt.

In response, Anthropic announced Project Glasswing, a cross-industry coalition that brings together AWS, Microsoft, Google, Cisco, CrowdStrike, Palo Alto Networks, JPMorgan Chase, NVIDIA, Apple, Broadcom, and the Linux Foundation. The shared conclusion across all of them: the old approaches to securing software are no longer sufficient, and the time to act is now. As CrowdStrike's CTO put it, the window between a vulnerability being discovered and exploited has collapsed; what once took months now happens in minutes.

The three problems just got harder

At every stage of the AI development transition, enterprises face the same three challenges. Mythos Preview sharpens all three at once, at a speed never previously possible.

Learning to build securely gets harder when AI can generate and modify code faster than teams can review it. The skills required to govern AI-generated code differ from those needed to write code manually, and those skills must keep pace with the tooling.

Governing what AI can and can't touch becomes critical when autonomous agents write and revise code without a human in the loop. Generally, we are still asking the wrong question. It’s less "what did our developers build?" and more "what did our AI build, and was it allowed to?"

Tracing which AI did what, where, and for whom is now a compliance and incident response imperative. When something goes wrong in an agentic pipeline, organizations need to answer that question immediately. Most can't.

As practitioners, we predicted long ago that this technology could eventually be leveraged by threat actors, effectively supercharging their attack capabilities. We already know that cybercriminals have a distinct offensive advantage over most enterprise security teams, and a tool like Mythos streamlines their nefarious processes even further. 

We're in the age of democratized cyberattacks, where the level of destruction once achievable only by elite threat actors can be carried out by a relative novice. We shouldn't be shocked, but many remain vastly underprepared. Swift, prioritized patching is a must, but this management is only ever as good as the traceability of every tool and dependency in use.

This is an industry-level problem

What makes Project Glasswing significant isn't solely determined by the capabilities Mythos Preview revealed; it is the scale and potency of the response. A coalition spanning hyperscalers, security vendors, financial institutions, and open-source foundations is all aligned on the same conclusion, and it’s a familiar narrative that speaks directly to the ethos of SCW. AI Software Governance has never been a “nice-to-have”, optional feature. This is the missing layer that every organization scaling AI-driven development needs in place before the next incident. Those who stick to an oft-used, reactive playbook are going to be swept off their feet in the worst possible way.

Enablement, not restriction

The temptation when reading findings like these is to reach for the brakes, to slow AI adoption, restrict tooling, and tighten controls. That's the wrong response, and it's not what the Glasswing partners are recommending either.

The organizations that will navigate this transition well are the ones that adopt AI-driven development with governance in place from the start. That means training developers as the tooling evolves, setting guardrails for what AI agents can access in your repositories, and, fundamentally, building the traceability that your compliance and incident response teams will demand without burning millions of tokens to facilitate it.

The moment to act is now

Anthropic's own advice to defenders: start with the tools available today. Don't wait for the next model. The value of getting your processes, scaffolds, and governance frameworks in place compounds quickly.

Secure Code Warrior sits at the center of all three enterprise problems the agentic era creates. If your organization is scaling AI-driven development, the question isn't whether you need AI Software Governance. It's whether you have it yet.

What this means for you

Para los CISO

Your vulnerability disclosure policies, patch cycles, and incident response playbooks were built for a world where exploit development took weeks. That world is gone. Now is the time to establish AI governance visibility across your development environment, while contextually understanding which AI agents are touching your codebase, what they're producing, and whether it meets your risk threshold. If you can't answer those questions today, that's the gap to close first. 

For CTOs

Your engineering teams are already using AI to ship faster. The question is now whether you have the guardrails in place to do it safely at scale. Governing what AI agents can and can't touch in your repositories, and maintaining traceability of AI contributions, is now a technical architecture decision, rather than an isolated security consideration. The organizations building this foundation now will be the ones who scale AI development with confidence. 

For Engineering Leaders

Your developers are being asked to move faster with AI tools they didn't design and can't fully predict. The skills required to review AI-generated code are genuinely different from those required to write code manually, and most teams haven't had the chance to develop them yet. Closing that capability gap is what makes AI adoption safer and more sustainable. 

For CEOs and Boards

Project Glasswing might be headline news, but it’s also a signal we cannot ignore. When AWS, Microsoft, Google, Cisco, CrowdStrike, and JPMorganChase align on an urgent, coordinated response to an AI-driven security risk, and Anthropic commits $100M to address it, that's the market telling you something. AI-driven software development is accelerating the rate at which vulnerabilities can be found and exploited. Governance over that process is now a board-level risk question. The organizations that treat it as one early will be better positioned to scale AI development — and to demonstrate to regulators, customers, and investors that they're doing it responsibly.

Ver recurso
Ver recurso

Anthropic's Claude Mythos represents a permanent, fundamental shift in how every security leader must approach their security program, especially with patch management of legacy systems.

¿Te interesa saber más?

Matias Madou, Ph.D. ist Sicherheitsexperte, Forscher, CTO und Mitbegründer von Secure Code Warrior. Matias promovierte an der Universität Gent in Anwendungssicherheit mit Schwerpunkt auf statischen Analyselösungen. Später kam er zu Fortify in den USA, wo er feststellte, dass es nicht ausreichte, ausschließlich Codeprobleme zu erkennen, ohne Entwicklern beim Schreiben von sicherem Code zu helfen. Dies inspirierte ihn dazu, Produkte zu entwickeln, die Entwickler unterstützen, die Sicherheitslast verringern und die Erwartungen der Kunden übertreffen. Wenn er nicht als Teil von Team Awesome an seinem Schreibtisch sitzt, steht er gerne auf der Bühne und präsentiert auf Konferenzen wie der RSA Conference, BlackHat und DefCon.

Más información

Secure Code Warrior a disposición de su empresa para ayudarle a proteger el código durante todo el ciclo de desarrollo de software y crear una cultura en la que la ciberseguridad sea una prioridad. Tanto si es responsable de seguridad de aplicaciones, desarrollador, responsable de seguridad de la información o cualquier otra persona relacionada con la seguridad, podemos ayudar a su empresa a reducir los riesgos asociados al código inseguro.

Reservar una demostración
Compartir en:
marcas de LinkedInSocialx logotipo
Autor
Doctor Matias Madou
Published Apr 10, 2026

Matias Madou, Ph.D. ist Sicherheitsexperte, Forscher, CTO und Mitbegründer von Secure Code Warrior. Matias promovierte an der Universität Gent in Anwendungssicherheit mit Schwerpunkt auf statischen Analyselösungen. Später kam er zu Fortify in den USA, wo er feststellte, dass es nicht ausreichte, ausschließlich Codeprobleme zu erkennen, ohne Entwicklern beim Schreiben von sicherem Code zu helfen. Dies inspirierte ihn dazu, Produkte zu entwickeln, die Entwickler unterstützen, die Sicherheitslast verringern und die Erwartungen der Kunden übertreffen. Wenn er nicht als Teil von Team Awesome an seinem Schreibtisch sitzt, steht er gerne auf der Bühne und präsentiert auf Konferenzen wie der RSA Conference, BlackHat und DefCon.

Matias ist Forscher und Entwickler mit mehr als 15 Jahren praktischer Erfahrung in der Softwaresicherheit. Er hat Lösungen für Unternehmen wie Fortify Software und sein eigenes Unternehmen Sensei Security entwickelt. Im Laufe seiner Karriere hat Matias mehrere Forschungsprojekte zur Anwendungssicherheit geleitet, die zu kommerziellen Produkten geführt haben, und verfügt über mehr als 10 Patente. Wenn er nicht an seinem Schreibtisch ist, war Matias als Ausbilder für fortgeschrittene Schulungen zur Anwendungssicherheit tätig und hält regelmäßig Vorträge auf globalen Konferenzen wie RSA Conference, Black Hat, DefCon, BSIMM, OWASP AppSec und BruCon.

Matias hat an der Universität Gent in Computertechnik promoviert, wo er Anwendungssicherheit durch Programmverschleierung studierte, um das Innenleben einer Anwendung zu verbergen.

Compartir en:
marcas de LinkedInSocialx logotipo

While these seismic shifts in software development and security seem to be regular occurrences in 2026, the arrival of Anthropic's latest, reportedly "most dangerous" AI coding model yet, Claude Mythos, represents a permanent, fundamental shift in how every security leader must approach their security program, especially with patch management of legacy systems.

Most enterprises are still navigating the shift from human-written code to AI-assisted development, ushering in new processes, learning to review what their AI co-pilots generate, building new skills, and establishing new guardrails around appropriate enterprise use.

But, the next phase of AI-driven software creation didn't wait.

This week, Anthropic published a detailed technical assessment of Claude Mythos Preview, a new frontier AI model with a capability that should stop every security and engineering leader in their tracks. It can autonomously identify and exploit zero-day vulnerabilities across all major operating systems and browsers, without human intervention after an initial prompt. Engineers with no formal security training directed the model overnight and woke up to complete, working exploits.

These findings are startling and not theoretical. Mythos Preview found a 27-year-old vulnerability in OpenBSD, one of the most security-hardened operating systems in the world, that allowed an attacker to remotely crash any machine just by connecting to it. It discovered a 16-year-old flaw in FFmpeg that automated testing tools had hit five million times without catching. It chained together multiple Linux kernel vulnerabilities autonomously to achieve full machine control. These weren't human-assisted discoveries; no real-world practitioner guided the process after the initial prompt.

In response, Anthropic announced Project Glasswing, a cross-industry coalition that brings together AWS, Microsoft, Google, Cisco, CrowdStrike, Palo Alto Networks, JPMorgan Chase, NVIDIA, Apple, Broadcom, and the Linux Foundation. The shared conclusion across all of them: the old approaches to securing software are no longer sufficient, and the time to act is now. As CrowdStrike's CTO put it, the window between a vulnerability being discovered and exploited has collapsed; what once took months now happens in minutes.

The three problems just got harder

At every stage of the AI development transition, enterprises face the same three challenges. Mythos Preview sharpens all three at once, at a speed never previously possible.

Learning to build securely gets harder when AI can generate and modify code faster than teams can review it. The skills required to govern AI-generated code differ from those needed to write code manually, and those skills must keep pace with the tooling.

Governing what AI can and can't touch becomes critical when autonomous agents write and revise code without a human in the loop. Generally, we are still asking the wrong question. It’s less "what did our developers build?" and more "what did our AI build, and was it allowed to?"

Tracing which AI did what, where, and for whom is now a compliance and incident response imperative. When something goes wrong in an agentic pipeline, organizations need to answer that question immediately. Most can't.

As practitioners, we predicted long ago that this technology could eventually be leveraged by threat actors, effectively supercharging their attack capabilities. We already know that cybercriminals have a distinct offensive advantage over most enterprise security teams, and a tool like Mythos streamlines their nefarious processes even further. 

We're in the age of democratized cyberattacks, where the level of destruction once achievable only by elite threat actors can be carried out by a relative novice. We shouldn't be shocked, but many remain vastly underprepared. Swift, prioritized patching is a must, but this management is only ever as good as the traceability of every tool and dependency in use.

This is an industry-level problem

What makes Project Glasswing significant isn't solely determined by the capabilities Mythos Preview revealed; it is the scale and potency of the response. A coalition spanning hyperscalers, security vendors, financial institutions, and open-source foundations is all aligned on the same conclusion, and it’s a familiar narrative that speaks directly to the ethos of SCW. AI Software Governance has never been a “nice-to-have”, optional feature. This is the missing layer that every organization scaling AI-driven development needs in place before the next incident. Those who stick to an oft-used, reactive playbook are going to be swept off their feet in the worst possible way.

Enablement, not restriction

The temptation when reading findings like these is to reach for the brakes, to slow AI adoption, restrict tooling, and tighten controls. That's the wrong response, and it's not what the Glasswing partners are recommending either.

The organizations that will navigate this transition well are the ones that adopt AI-driven development with governance in place from the start. That means training developers as the tooling evolves, setting guardrails for what AI agents can access in your repositories, and, fundamentally, building the traceability that your compliance and incident response teams will demand without burning millions of tokens to facilitate it.

The moment to act is now

Anthropic's own advice to defenders: start with the tools available today. Don't wait for the next model. The value of getting your processes, scaffolds, and governance frameworks in place compounds quickly.

Secure Code Warrior sits at the center of all three enterprise problems the agentic era creates. If your organization is scaling AI-driven development, the question isn't whether you need AI Software Governance. It's whether you have it yet.

What this means for you

Para los CISO

Your vulnerability disclosure policies, patch cycles, and incident response playbooks were built for a world where exploit development took weeks. That world is gone. Now is the time to establish AI governance visibility across your development environment, while contextually understanding which AI agents are touching your codebase, what they're producing, and whether it meets your risk threshold. If you can't answer those questions today, that's the gap to close first. 

For CTOs

Your engineering teams are already using AI to ship faster. The question is now whether you have the guardrails in place to do it safely at scale. Governing what AI agents can and can't touch in your repositories, and maintaining traceability of AI contributions, is now a technical architecture decision, rather than an isolated security consideration. The organizations building this foundation now will be the ones who scale AI development with confidence. 

For Engineering Leaders

Your developers are being asked to move faster with AI tools they didn't design and can't fully predict. The skills required to review AI-generated code are genuinely different from those required to write code manually, and most teams haven't had the chance to develop them yet. Closing that capability gap is what makes AI adoption safer and more sustainable. 

For CEOs and Boards

Project Glasswing might be headline news, but it’s also a signal we cannot ignore. When AWS, Microsoft, Google, Cisco, CrowdStrike, and JPMorganChase align on an urgent, coordinated response to an AI-driven security risk, and Anthropic commits $100M to address it, that's the market telling you something. AI-driven software development is accelerating the rate at which vulnerabilities can be found and exploited. Governance over that process is now a board-level risk question. The organizations that treat it as one early will be better positioned to scale AI development — and to demonstrate to regulators, customers, and investors that they're doing it responsibly.

Ver recurso
Ver recurso

Rellene el siguiente formulario para descargar el informe.

Solicitamos su permiso para enviarle información sobre nuestros productos y/o temas relacionados con la codificación segura. Tratamos sus datos personales con el máximo cuidado y nunca los vendemos a otras empresas con fines comerciales.

Enviar
Icono de éxito de SCW
Icono de error scw
Para enviar el formulario, active las cookies de «Analytics». Cuando haya terminado, puede desactivarlas en cualquier momento.

While these seismic shifts in software development and security seem to be regular occurrences in 2026, the arrival of Anthropic's latest, reportedly "most dangerous" AI coding model yet, Claude Mythos, represents a permanent, fundamental shift in how every security leader must approach their security program, especially with patch management of legacy systems.

Most enterprises are still navigating the shift from human-written code to AI-assisted development, ushering in new processes, learning to review what their AI co-pilots generate, building new skills, and establishing new guardrails around appropriate enterprise use.

But, the next phase of AI-driven software creation didn't wait.

This week, Anthropic published a detailed technical assessment of Claude Mythos Preview, a new frontier AI model with a capability that should stop every security and engineering leader in their tracks. It can autonomously identify and exploit zero-day vulnerabilities across all major operating systems and browsers, without human intervention after an initial prompt. Engineers with no formal security training directed the model overnight and woke up to complete, working exploits.

These findings are startling and not theoretical. Mythos Preview found a 27-year-old vulnerability in OpenBSD, one of the most security-hardened operating systems in the world, that allowed an attacker to remotely crash any machine just by connecting to it. It discovered a 16-year-old flaw in FFmpeg that automated testing tools had hit five million times without catching. It chained together multiple Linux kernel vulnerabilities autonomously to achieve full machine control. These weren't human-assisted discoveries; no real-world practitioner guided the process after the initial prompt.

In response, Anthropic announced Project Glasswing, a cross-industry coalition that brings together AWS, Microsoft, Google, Cisco, CrowdStrike, Palo Alto Networks, JPMorgan Chase, NVIDIA, Apple, Broadcom, and the Linux Foundation. The shared conclusion across all of them: the old approaches to securing software are no longer sufficient, and the time to act is now. As CrowdStrike's CTO put it, the window between a vulnerability being discovered and exploited has collapsed; what once took months now happens in minutes.

The three problems just got harder

At every stage of the AI development transition, enterprises face the same three challenges. Mythos Preview sharpens all three at once, at a speed never previously possible.

Learning to build securely gets harder when AI can generate and modify code faster than teams can review it. The skills required to govern AI-generated code differ from those needed to write code manually, and those skills must keep pace with the tooling.

Governing what AI can and can't touch becomes critical when autonomous agents write and revise code without a human in the loop. Generally, we are still asking the wrong question. It’s less "what did our developers build?" and more "what did our AI build, and was it allowed to?"

Tracing which AI did what, where, and for whom is now a compliance and incident response imperative. When something goes wrong in an agentic pipeline, organizations need to answer that question immediately. Most can't.

As practitioners, we predicted long ago that this technology could eventually be leveraged by threat actors, effectively supercharging their attack capabilities. We already know that cybercriminals have a distinct offensive advantage over most enterprise security teams, and a tool like Mythos streamlines their nefarious processes even further. 

We're in the age of democratized cyberattacks, where the level of destruction once achievable only by elite threat actors can be carried out by a relative novice. We shouldn't be shocked, but many remain vastly underprepared. Swift, prioritized patching is a must, but this management is only ever as good as the traceability of every tool and dependency in use.

This is an industry-level problem

What makes Project Glasswing significant isn't solely determined by the capabilities Mythos Preview revealed; it is the scale and potency of the response. A coalition spanning hyperscalers, security vendors, financial institutions, and open-source foundations is all aligned on the same conclusion, and it’s a familiar narrative that speaks directly to the ethos of SCW. AI Software Governance has never been a “nice-to-have”, optional feature. This is the missing layer that every organization scaling AI-driven development needs in place before the next incident. Those who stick to an oft-used, reactive playbook are going to be swept off their feet in the worst possible way.

Enablement, not restriction

The temptation when reading findings like these is to reach for the brakes, to slow AI adoption, restrict tooling, and tighten controls. That's the wrong response, and it's not what the Glasswing partners are recommending either.

The organizations that will navigate this transition well are the ones that adopt AI-driven development with governance in place from the start. That means training developers as the tooling evolves, setting guardrails for what AI agents can access in your repositories, and, fundamentally, building the traceability that your compliance and incident response teams will demand without burning millions of tokens to facilitate it.

The moment to act is now

Anthropic's own advice to defenders: start with the tools available today. Don't wait for the next model. The value of getting your processes, scaffolds, and governance frameworks in place compounds quickly.

Secure Code Warrior sits at the center of all three enterprise problems the agentic era creates. If your organization is scaling AI-driven development, the question isn't whether you need AI Software Governance. It's whether you have it yet.

What this means for you

Para los CISO

Your vulnerability disclosure policies, patch cycles, and incident response playbooks were built for a world where exploit development took weeks. That world is gone. Now is the time to establish AI governance visibility across your development environment, while contextually understanding which AI agents are touching your codebase, what they're producing, and whether it meets your risk threshold. If you can't answer those questions today, that's the gap to close first. 

For CTOs

Your engineering teams are already using AI to ship faster. The question is now whether you have the guardrails in place to do it safely at scale. Governing what AI agents can and can't touch in your repositories, and maintaining traceability of AI contributions, is now a technical architecture decision, rather than an isolated security consideration. The organizations building this foundation now will be the ones who scale AI development with confidence. 

For Engineering Leaders

Your developers are being asked to move faster with AI tools they didn't design and can't fully predict. The skills required to review AI-generated code are genuinely different from those required to write code manually, and most teams haven't had the chance to develop them yet. Closing that capability gap is what makes AI adoption safer and more sustainable. 

For CEOs and Boards

Project Glasswing might be headline news, but it’s also a signal we cannot ignore. When AWS, Microsoft, Google, Cisco, CrowdStrike, and JPMorganChase align on an urgent, coordinated response to an AI-driven security risk, and Anthropic commits $100M to address it, that's the market telling you something. AI-driven software development is accelerating the rate at which vulnerabilities can be found and exploited. Governance over that process is now a board-level risk question. The organizations that treat it as one early will be better positioned to scale AI development — and to demonstrate to regulators, customers, and investors that they're doing it responsibly.

Ver seminario web
Empiece
Más información

Haga clic en el enlace de abajo y descargue el PDF de este recurso.

Secure Code Warrior a disposición de su empresa para ayudarle a proteger el código durante todo el ciclo de desarrollo de software y crear una cultura en la que la ciberseguridad sea una prioridad. Tanto si es responsable de seguridad de aplicaciones, desarrollador, responsable de seguridad de la información o cualquier otra persona relacionada con la seguridad, podemos ayudar a su empresa a reducir los riesgos asociados al código inseguro.

Ver informeReservar una demostración
Ver recurso
Compartir en:
marcas de LinkedInSocialx logotipo
¿Te interesa saber más?

Compartir en:
marcas de LinkedInSocialx logotipo
Autor
Doctor Matias Madou
Published Apr 10, 2026

Matias Madou, Ph.D. ist Sicherheitsexperte, Forscher, CTO und Mitbegründer von Secure Code Warrior. Matias promovierte an der Universität Gent in Anwendungssicherheit mit Schwerpunkt auf statischen Analyselösungen. Später kam er zu Fortify in den USA, wo er feststellte, dass es nicht ausreichte, ausschließlich Codeprobleme zu erkennen, ohne Entwicklern beim Schreiben von sicherem Code zu helfen. Dies inspirierte ihn dazu, Produkte zu entwickeln, die Entwickler unterstützen, die Sicherheitslast verringern und die Erwartungen der Kunden übertreffen. Wenn er nicht als Teil von Team Awesome an seinem Schreibtisch sitzt, steht er gerne auf der Bühne und präsentiert auf Konferenzen wie der RSA Conference, BlackHat und DefCon.

Matias ist Forscher und Entwickler mit mehr als 15 Jahren praktischer Erfahrung in der Softwaresicherheit. Er hat Lösungen für Unternehmen wie Fortify Software und sein eigenes Unternehmen Sensei Security entwickelt. Im Laufe seiner Karriere hat Matias mehrere Forschungsprojekte zur Anwendungssicherheit geleitet, die zu kommerziellen Produkten geführt haben, und verfügt über mehr als 10 Patente. Wenn er nicht an seinem Schreibtisch ist, war Matias als Ausbilder für fortgeschrittene Schulungen zur Anwendungssicherheit tätig und hält regelmäßig Vorträge auf globalen Konferenzen wie RSA Conference, Black Hat, DefCon, BSIMM, OWASP AppSec und BruCon.

Matias hat an der Universität Gent in Computertechnik promoviert, wo er Anwendungssicherheit durch Programmverschleierung studierte, um das Innenleben einer Anwendung zu verbergen.

Compartir en:
marcas de LinkedInSocialx logotipo

While these seismic shifts in software development and security seem to be regular occurrences in 2026, the arrival of Anthropic's latest, reportedly "most dangerous" AI coding model yet, Claude Mythos, represents a permanent, fundamental shift in how every security leader must approach their security program, especially with patch management of legacy systems.

Most enterprises are still navigating the shift from human-written code to AI-assisted development, ushering in new processes, learning to review what their AI co-pilots generate, building new skills, and establishing new guardrails around appropriate enterprise use.

But, the next phase of AI-driven software creation didn't wait.

This week, Anthropic published a detailed technical assessment of Claude Mythos Preview, a new frontier AI model with a capability that should stop every security and engineering leader in their tracks. It can autonomously identify and exploit zero-day vulnerabilities across all major operating systems and browsers, without human intervention after an initial prompt. Engineers with no formal security training directed the model overnight and woke up to complete, working exploits.

These findings are startling and not theoretical. Mythos Preview found a 27-year-old vulnerability in OpenBSD, one of the most security-hardened operating systems in the world, that allowed an attacker to remotely crash any machine just by connecting to it. It discovered a 16-year-old flaw in FFmpeg that automated testing tools had hit five million times without catching. It chained together multiple Linux kernel vulnerabilities autonomously to achieve full machine control. These weren't human-assisted discoveries; no real-world practitioner guided the process after the initial prompt.

In response, Anthropic announced Project Glasswing, a cross-industry coalition that brings together AWS, Microsoft, Google, Cisco, CrowdStrike, Palo Alto Networks, JPMorgan Chase, NVIDIA, Apple, Broadcom, and the Linux Foundation. The shared conclusion across all of them: the old approaches to securing software are no longer sufficient, and the time to act is now. As CrowdStrike's CTO put it, the window between a vulnerability being discovered and exploited has collapsed; what once took months now happens in minutes.

The three problems just got harder

At every stage of the AI development transition, enterprises face the same three challenges. Mythos Preview sharpens all three at once, at a speed never previously possible.

Learning to build securely gets harder when AI can generate and modify code faster than teams can review it. The skills required to govern AI-generated code differ from those needed to write code manually, and those skills must keep pace with the tooling.

Governing what AI can and can't touch becomes critical when autonomous agents write and revise code without a human in the loop. Generally, we are still asking the wrong question. It’s less "what did our developers build?" and more "what did our AI build, and was it allowed to?"

Tracing which AI did what, where, and for whom is now a compliance and incident response imperative. When something goes wrong in an agentic pipeline, organizations need to answer that question immediately. Most can't.

As practitioners, we predicted long ago that this technology could eventually be leveraged by threat actors, effectively supercharging their attack capabilities. We already know that cybercriminals have a distinct offensive advantage over most enterprise security teams, and a tool like Mythos streamlines their nefarious processes even further. 

We're in the age of democratized cyberattacks, where the level of destruction once achievable only by elite threat actors can be carried out by a relative novice. We shouldn't be shocked, but many remain vastly underprepared. Swift, prioritized patching is a must, but this management is only ever as good as the traceability of every tool and dependency in use.

This is an industry-level problem

What makes Project Glasswing significant isn't solely determined by the capabilities Mythos Preview revealed; it is the scale and potency of the response. A coalition spanning hyperscalers, security vendors, financial institutions, and open-source foundations is all aligned on the same conclusion, and it’s a familiar narrative that speaks directly to the ethos of SCW. AI Software Governance has never been a “nice-to-have”, optional feature. This is the missing layer that every organization scaling AI-driven development needs in place before the next incident. Those who stick to an oft-used, reactive playbook are going to be swept off their feet in the worst possible way.

Enablement, not restriction

The temptation when reading findings like these is to reach for the brakes, to slow AI adoption, restrict tooling, and tighten controls. That's the wrong response, and it's not what the Glasswing partners are recommending either.

The organizations that will navigate this transition well are the ones that adopt AI-driven development with governance in place from the start. That means training developers as the tooling evolves, setting guardrails for what AI agents can access in your repositories, and, fundamentally, building the traceability that your compliance and incident response teams will demand without burning millions of tokens to facilitate it.

The moment to act is now

Anthropic's own advice to defenders: start with the tools available today. Don't wait for the next model. The value of getting your processes, scaffolds, and governance frameworks in place compounds quickly.

Secure Code Warrior sits at the center of all three enterprise problems the agentic era creates. If your organization is scaling AI-driven development, the question isn't whether you need AI Software Governance. It's whether you have it yet.

What this means for you

Para los CISO

Your vulnerability disclosure policies, patch cycles, and incident response playbooks were built for a world where exploit development took weeks. That world is gone. Now is the time to establish AI governance visibility across your development environment, while contextually understanding which AI agents are touching your codebase, what they're producing, and whether it meets your risk threshold. If you can't answer those questions today, that's the gap to close first. 

For CTOs

Your engineering teams are already using AI to ship faster. The question is now whether you have the guardrails in place to do it safely at scale. Governing what AI agents can and can't touch in your repositories, and maintaining traceability of AI contributions, is now a technical architecture decision, rather than an isolated security consideration. The organizations building this foundation now will be the ones who scale AI development with confidence. 

For Engineering Leaders

Your developers are being asked to move faster with AI tools they didn't design and can't fully predict. The skills required to review AI-generated code are genuinely different from those required to write code manually, and most teams haven't had the chance to develop them yet. Closing that capability gap is what makes AI adoption safer and more sustainable. 

For CEOs and Boards

Project Glasswing might be headline news, but it’s also a signal we cannot ignore. When AWS, Microsoft, Google, Cisco, CrowdStrike, and JPMorganChase align on an urgent, coordinated response to an AI-driven security risk, and Anthropic commits $100M to address it, that's the market telling you something. AI-driven software development is accelerating the rate at which vulnerabilities can be found and exploited. Governance over that process is now a board-level risk question. The organizations that treat it as one early will be better positioned to scale AI development — and to demonstrate to regulators, customers, and investors that they're doing it responsibly.

Índice

Descargar PDF
Ver recurso
¿Te interesa saber más?

Matias Madou, Ph.D. ist Sicherheitsexperte, Forscher, CTO und Mitbegründer von Secure Code Warrior. Matias promovierte an der Universität Gent in Anwendungssicherheit mit Schwerpunkt auf statischen Analyselösungen. Später kam er zu Fortify in den USA, wo er feststellte, dass es nicht ausreichte, ausschließlich Codeprobleme zu erkennen, ohne Entwicklern beim Schreiben von sicherem Code zu helfen. Dies inspirierte ihn dazu, Produkte zu entwickeln, die Entwickler unterstützen, die Sicherheitslast verringern und die Erwartungen der Kunden übertreffen. Wenn er nicht als Teil von Team Awesome an seinem Schreibtisch sitzt, steht er gerne auf der Bühne und präsentiert auf Konferenzen wie der RSA Conference, BlackHat und DefCon.

Más información

Secure Code Warrior a disposición de su empresa para ayudarle a proteger el código durante todo el ciclo de desarrollo de software y crear una cultura en la que la ciberseguridad sea una prioridad. Tanto si es responsable de seguridad de aplicaciones, desarrollador, responsable de seguridad de la información o cualquier otra persona relacionada con la seguridad, podemos ayudar a su empresa a reducir los riesgos asociados al código inseguro.

Reservar una demostraciónDescargar
Compartir en:
marcas de LinkedInSocialx logotipo
Centro de recursos

Recursos para empezar

Más entradas
Centro de recursos

Recursos para empezar

Más entradas