02-347-7730  |  Saeree ERP - Complete ERP Solution for Thai Businesses Contact Us

Project Glasswing — Anthropic's $100M Cyber Defense Initiative + Claude Mythos Finds 17-Year-Old FreeBSD Bug (CVE-2026-4747)

  • Home
  • Blog
  • Project Glasswing — Anthropic's $100M + Claude Mythos
Anthropic Project Glasswing $100M AI Cyber Defense Claude Mythos Preview
  • 20
  • April

In early April 2026, Anthropic launched Project Glasswing — a program distributing $100 million in Claude usage credits plus $4 million in direct donations to 12 launch partners (AWS, Apple, Google, Microsoft, Nvidia, CrowdStrike, JPMorganChase, Linux Foundation, and four more), with extended access for 40+ additional organizations maintaining critical software infrastructure. The stated goal: give defenders the same frontier AI capability attackers already have.

The real headline is Claude Mythos Preview — an unreleased general-purpose frontier model that has already surfaced real, exploitable bugs hidden in code for decades: a 27-year-old OpenBSD TCP SACK flaw, a 16-year-old FFmpeg H.264 bug, and a 17-year-old FreeBSD NFS remote-code-execution flaw. The last one now has a public CVE assignment: CVE-2026-4747. This article follows on from yesterday's Patch Tuesday April 2026 piece.

In short: Project Glasswing = $100M credits + $4M donations from Anthropic / 12 launch partners + 40+ additional orgs / Claude Mythos Preview = a frontier model that outperforms skilled humans at vulnerability discovery / Confirmed finds: OpenBSD 27yr, FFmpeg 16yr, FreeBSD NFS 17yr (CVE-2026-4747 RCE), Linux kernel privilege escalation chains, browser sandbox escapes, TLS/AES-GCM/SSH weaknesses / Impact: open-source infrastructure is now a shared risk for the entire internet. Thai organizations running FreeBSD, FFmpeg, or Linux kernel components should check patches immediately.

What Is Project Glasswing

Project Glasswing is Anthropic's April 2026 program to "preempt AI-driven cyberattacks" — the philosophy being that if attackers are using frontier AI to find exploits, defenders must have the same access first. Anthropic's framing is that a modern frontier model can now do vulnerability discovery and patch generation at a level comparable to a senior security researcher.

The funding structure has two parts:

  • $100M in usage credits — entitlements to run Claude (including the Mythos Preview) for security research, vulnerability triage, and patch development across participating companies and projects.
  • $4M in direct donations — cash grants to open-source security organizations maintaining critical infrastructure (notably the Linux Foundation), with no strings attached to Claude usage.

The core philosophy is "defender parity" — equipping defenders with the same AI capability attackers already have. Unlike a typical bug bounty, Glasswing explicitly targets infrastructure software (operating systems, compilers, crypto libraries, hypervisors) — the code everyone uses but very few people actively maintain. The entire digital economy runs on a surprisingly small amount of code with a surprisingly small number of maintainers.

12 Launch Partners + 40 More Organizations

Anthropic named 12 launch partners spanning cloud, hardware, software, financial services, and open-source stewardship — effectively the pillars of the modern internet:

Company / OrganizationDomainWhy They Matter
Amazon Web ServicesCloud infrastructureThe world's #1 cloud — any CVE in Amazon Linux/EC2 reaches everyone
AnthropicAI foundation modelBuilder of Claude / Mythos Preview itself
AppleOS / device ecosystemiOS, macOS, Safari WebKit — CVEs reach users via auto-update
BroadcomSemiconductor + VMwareVMware hypervisor underpins data centers worldwide
CiscoNetwork hardware + securityFirewalls, routers, switches in almost every enterprise
CrowdStrikeEDR / threat intelligenceHolds real-world attacker TTPs that validate Mythos findings
GoogleAndroid, Chrome, GCPChromium / Android reach billions — a bug here is a crisis
JPMorganChaseFinancial servicesLargest bank in the world — systemic financial risk if compromised
Linux FoundationOpen-source stewardshipOversees the Linux kernel plus hundreds of sub-projects (PostgreSQL, Kubernetes, etc.)
MicrosoftWindows, Azure, OfficeOne company's Patch Tuesday alone = 150+ CVEs/month (see April 2026 Patch Tuesday)
NVIDIAGPU + CUDAGPU drivers are a frequent source of privilege-escalation CVEs
Palo Alto NetworksNext-gen firewall / SASEEnterprise-class firewall — Palo Alto CVEs are expensive to patch

Beyond the 12, Anthropic extended Mythos Preview access to 40+ additional organizations maintaining critical software infrastructure — including curl, OpenSSL, OpenSSH, Python, Node.js, and the systemd / glibc / coreutils ecosystem that ships with essentially every operating system. The principle is "software used by three billion people every day deserves AI-assisted auditing" rather than relying on volunteer maintainers alone (see the wider open-source fragility discussion in Cybersecurity Trends 2026).

Claude Mythos Preview — The Model That Finds 27-Year-Old Bugs

The shocking part of this announcement is not the money. It is Claude Mythos Preview — a frontier model Anthropic explicitly describes as "general-purpose" (not specifically trained for security) — yet it has found real bugs in systems that have survived decades of human code review.

The findings below are confirmed on Anthropic's public blog (red.anthropic.com/2026/mythos-preview/), not marketing claims:

SystemAge of BugDetails
OpenBSD27 yearsTCP SACK implementation — remote denial of service (late-1990s-era code)
FFmpeg16 yearsH.264 codec vulnerability (traces back to 2003), affecting every platform using FFmpeg in its video pipeline
FreeBSD NFS17 yearsRemote code execution — CVE-2026-4747 (the only publicly-assigned CVE from this batch so far)
Linux kernel-Multiple privilege escalation chains (2-4 CVEs linked together)
Web browsers-JIT heap spray + sandbox escapes (patches are still being closed)
Cryptography libraries-Weaknesses in TLS, AES-GCM, SSH — most require context-specific exploitation

Mythos also surfaced SHA-3 hash commitments that are being held for responsible disclosure pending patch completion. Anthropic notes that Mythos represents a "significant capability jump compared to Claude Opus 4.6 at autonomous exploit development." For context on Claude's recent capability jumps, see Claude Opus 4.7 — detailed review, which is the predecessor generation to Mythos.

Warning: If Mythos can find these bugs, adversarial AI used by attackers can find the same ones. Open-source infrastructure is not "someone else's problem" — it is a shared risk for the entire internet. Thai organizations using FreeBSD for NAS/storage, FFmpeg in video pipelines, or older Linux kernel versions should check for patches now — especially CVE-2026-4747 (FreeBSD NFS), which has an assigned CVE and whose details adversaries will be able to reconstruct over time. Pair this with yesterday's April 2026 Patch Tuesday as part of the same concurrent patch wave.

CVE-2026-4747 — Inside the 17-Year-Old FreeBSD NFS Bug

Of all the Mythos Preview findings, only one currently has a publicly-assigned CVE number: CVE-2026-4747 in the FreeBSD NFS implementation. It is a remote-code-execution vulnerability triggered by a carefully crafted NFS packet.

What makes CVE-2026-4747 striking:

  • 17 years old — the code was written and merged into FreeBSD back in 2009. It passed code review by hundreds of senior developers and every static analyzer FreeBSD uses — and survived all of it.
  • Mythos found it, not a human — meaning traditional review may not be enough for codebases of this size.
  • There are likely more bugs of this vintage — if Mythos found 6 major bugs in core infrastructure in a matter of weeks, it is reasonable to expect more decade-old bugs elsewhere.

Which Thai organizations should pay particular attention? Anyone using FreeBSD as a storage appliance, NAS, or firewall (pfSense, OPNsense, iXsystems TrueNAS) — because NFS is a primary file-sharing protocol between servers. Patch as soon as upstream ships fixes and read Disaster Recovery planning alongside it in case of incident.

Glasswing vs OpenAI's GPT-5.4-Cyber + Trusted Access

Two weeks after Glasswing launched, OpenAI announced a similar program on April 16, 2026Trusted Access for Cyber Defense, paired with a specialized model called GPT-5.4-Cyber. The two announcements together kicked off an "arms race" in defensive AI between the two leading frontier-model labs.

The key difference: Anthropic partnered with infrastructure companies (AWS, Cisco, Linux Foundation) to fix problems upstream, while OpenAI partnered with defender and researcher organizations to scale vulnerability response at the endpoint. A dedicated deep-dive on GPT-5.4-Cyber is coming separately — for now the point is simply that the AI-driven security era has officially become a two-lab race.

Impact on Thai Organizations

Thai organizations are not excluded from Glasswing — software from all 12 launch partners reaches Thailand through normal vendor channels. Expected effects:

  • Patches will ship faster — AI-audited software will have a shorter patch release cycle. But "a patch exists" is not the same as "your organization has applied it" — that gap is the attack surface.
  • Zero-day windows shrink — from months down to days, because both defenders and attackers now have AI finding bugs at a similar pace. Thai patch cycles must follow suit (see 2FA as a layered defense).
  • CompliancePDPA and the Thai Cybersecurity Act are entering a phase where AI vulnerability disclosures must be factored into compliance programs. Verify that the Thai government security standard your organization follows has been updated for the AI-audit era.
  • Supply chain risk — if your vendors are not Glasswing partners and do not run their own AI-assisted auditing, those vendors become the weakest links in your supply chain.

For broader Thai threat-landscape context and prior CVE case studies, see Cybersecurity in Thailand, SharePoint CVE 2026, Oracle CVE-2026-21992, and Langflow CVE 2026.

Saeree ERP in the AI-Driven Security Era

To be straightforward: Saeree ERP does not run its own offensive-AI security program. We are not Anthropic, and we do not operate a Mythos-class vulnerability-discovery model. Our strategy is "rely on upstream security from the best partners possible" — notably the Linux Foundation, which is a Glasswing launch partner.

  • Foundational stack — Saeree runs on Linux + PostgreSQL, both inside the Glasswing ecosystem (via the Linux Foundation). New kernel / DB patches benefit from AI-assisted auditing before release, improving patch quality.
  • 2FA + Digital Signature modules — built into Saeree ERP to prevent credential bypass and document forgery. See How 2FA helps and Digital Signatures in ERP.
  • Deployment choiceon-premise lets the customer control patch cadence (fast or slow, depending on IT policy) / GDCC cloud lets the operator handle patches centrally. Both fit the AI-driven security era.
  • No dependency on SharePoint / Adobe Acrobat — Saeree's document workflow does not tie into the Microsoft ecosystem, keeping Saeree's own attack surface smaller than a legacy ERP stack.

Stated plainly: Saeree is not an "AI security company." We are an ERP that picks good vendors and patches quickly. In an era where the zero-day window shrinks from months to days, "patch quickly" is what separates organizations that survive from those that do not (see further context in emerging ERP threats).

Suitable / Not Suitable — Organizations Ready for the AI-Defense Era

Not every organization needs to "sprint" to match AI-driven security. Here is a quick self-check:

✓ Ready for AI-defense if…✗ High risk if…
You have a complete inventory of OS / library versions in useYou don't know which FreeBSD / FFmpeg versions run in production
Patch cycle for critical CVEs is < 14 daysPatch cycle > 60 days, or "we patch when the client asks"
You monitor CVE feeds (NVD / CISA KEV)You find out about CVEs from monthly news roundups
Your vendors are part of the Glasswing / Trusted Access ecosystemClosed-source vendors, no CVE reporting, no audit roadmap
Backups + DR plan that is actually testedBackups exist but have never been restored

If several red rows feel familiar — don't panic, but do start a security posture assessment quickly. Use 2026 Trends as a starting point, and cross-reference with the Songkran 2026 AI roundup, which collated Glasswing and other AI announcements in one place.

"Mythos proved AI finds bugs faster than humans. The question is who uses it first — you or the attacker."

— Saeree ERP, 2026

Ready for the AI-Driven Cybersecurity Era?

Free consultation with Grand Linux Solution experts — security posture audit + patch-cycle planning for the AI-defense era

Request Free Consultation

Call 02-347-7730 | sale@grandlinux.com

References

Saeree ERP Author

About the Author

Paitoon Butri

Network & Server Security Specialist, Grand Linux Solution Co., Ltd.