Anthropic did the opposite of every established norm in vulnerability disclosure, and I am curious why. Or to be fair, someone commented on my earlier post that they aren’t sure “cartel” is a fair term here.
Ok, challenge accepted.
A company that genuinely believed it had discovered an unprecedented offensive capability would do what every serious security organization has done since CERT/CC was founded in 1988: coordinate disclosure quietly, patch the affected systems, publish the technical details after remediation, and let the work speak for itself.
In the aftermath of the Morris Worm attack, the Defense Advanced Research Projects Agency (DARPA) asked the SEI to establish an incident response capability. In 1988 Pethia founded the CERT Coordination Center (CERT/CC) as the first computer emergency response team.
That’s right, 1988. We aren’t new to this. And even the newest and shiniest researchers usually get it. Project Zero does this. Talos does this. ZDI does this. They don’t hold press conferences before patches ship, because they understand the economics, if not the history. They don’t create named consortiums with Fortune 100 logos to gate-keep safety because that’s been known as hoarding. They don’t radically inflate the discovery tool price 5x the prior product, and then discount it $100M in credits to nudge people to use it, because that’s known as manipulation.
What does a normal discovery look like? Let’s say Google’s Project Zero finds a critical vulnerability. They file it with the vendor, start a 90-day clock (incidentally a very short window that was pushed as a standard by Google), publish the technical writeup after the patch ships, and move on. The writeup includes reproduction steps, version numbers, CVSS scores, and enough detail for independent verification. A consortium adds nothing. They don’t withhold discovery tools. They don’t issue press releases about how their own researchers are too dangerous to let out of their cages. The work is the product. The reputation follows the work. I recently gave Google a good rubbing for issues with their attacks on Microsoft NTLM, if you want to see an example of the normative dynamic. Google turned threat knobs up to 11, while saying damage is the defenders’ problem.
The clever mind will notice Google is a Glasswing partner, and Google’s own CISO Heather Adkins is a contributing author on the CSA “not just one model, one vendor, one announcement… Mythos-ready” paper. Ok, point taken. But that does not validate the consortium. Look at Google’s actual Glasswing quote:
It’s always been critical that the industry work together on emerging security issues.
That is a politically neutral statement about showing up to work anywhere with anyone, not a statement about Mythos finding anything in Google’s products. Google joining Glasswing is Google taking a zero-risk seat on the possibility that Anthropic’s claims are real. It is a rational move for any company to take a free seat at a table where vulnerability information will be shared. It is not an endorsement of any evidence, which Google’s own Project Zero standards would reject on the first page of the Anthropic card.
There are so many examples of what normal discovery does that it raises the obvious question of why Anthropic enters the ring only to start punching themselves in the head. When DARPA AIxCC found 54 vulnerabilities in four hours at DEF CON, it was a competition with public rules, public participants, public results, and no commercial product attached. When AISLE found 12 OpenSSL zero-days, they published the methodology and the results. When Carlini’s own February paper documented 500+ vulnerabilities with Opus 4.6, it followed a recognizable research disclosure pattern.
Mythos breaks every one of those norms, as if someone in the marketing department grabbed the reins and said the world is about to change for… marketing department KPIs.
The capability is withheld. The evidence is self-evaluated. The technical document refuses to quantify the headline claim. The disclosure regime is controlled by the vendor. The consortium is funded by the vendor. The partners validate the vendor’s product as a condition of access.
Seasoned practitioners DO NOT do this.
Decades of vulnerability management, thousands of experts, have taught the industry several things that Anthropic’s Mythos launch ignores or contradicts:
- Volume is not severity. OSS-Fuzz finds thousands of bugs per quarter. The industry absorbs them through triage, prioritization, and patching. “Thousands of vulnerabilities” is not a crisis. It is a Tuesday. A first-year researcher panics at the number. A seasoned CISO asks: what’s the CVSS distribution, what’s the exploitability, what’s the exposure, what’s the patch velocity? The system card answers none of those questions, while flooding the reader with over 200 pages of unnecessary filler and nonsense.
- Discovery is the easy part. The constraint on vulnerability management has been remediation for over a decade. Finding bugs faster without fixing them faster grows the backlog already growing beyond capacity. Anthropic’s own stated justification for Glasswing is defensive uplift, yet their system card measures zero remediation metrics. No patching velocity delta. No mean-time-to-remediation. No partner-reported CVE closure rate. A seasoned security leader would never build a defensive program and then measure offensive capability only, making remediation a second-class story. That is the kind of dog and pony show that any good security initiative would slam the door on. Or it’s like a surgeon telling you they have an even sharper scalpel to cut you deeper and faster. Yeah, so then what?
- Severity is not leverage. Responsible disclosure exists precisely to prevent the weaponization of vulnerability knowledge for commercial or political advantage. The entire ethical framework of the security community is built around the principle that knowledge of vulnerabilities is meant for remediation, not a matter of market positioning. McAfee predicted five million Michelangelo infections in 1992, got a few thousand, never retracted, and rode the panic to a decade of market dominance. Symantec ran the same playbook for years: inflate the threat, sell the cure. The industry is still recovering from the blocklist monoculture those companies built on manufactured fear. When a vendor withholds a capability from the market, grants selective access to the largest incumbents, and funds participation through its own credits, the vulnerability knowledge is being used as leverage. That is the opposite of responsible disclosure. It is cynicism and protection racketeering that undermine decades of trust building by well-intentioned hackers.
- Fear is evidence of something other than security engineering. The “too dangerous to release” framing is doing commercial work, not security work. It justifies inflationary pricing with the same ethics as surge pricing taxis during a terror attack. It should not be used to justify a consortium structure. It should not justify withholding a model from the market. It should not justify a $100M credit pool that creates a vendor-funded validation loop. Every element of Anthropic’s commercial structure depends on fear being their blunt tool. If the capability is in fact already a commodity, as AISLE has quickly demonstrated, the fear-based pricing collapses, the consortium has no reason to exist, and the withholding is just a market corruption.
The burden of proof is on Anthropic now to show more evidence, or it’s a manufactured crisis pattern. Step back and look at their sequence first as a product launch and then ask if there is any security event:
- Build a model.
- Test it against targets with mitigations removed.
- Get a headline number (72.4%) that collapses under scrutiny (4.4%).
- Put the headline number in the blog and the collapse in a footnote on page 52.
- Claim “thousands” in the press materials and refuse to quantify in the technical document.
- Attribute a prior model’s finding to the new model.
- Price the new model at 5x.
- Create a consortium of the largest companies in tech.
- Fund their participation with credits for the new model.
- Frame the whole thing as too dangerous for the public.
- Let the press, the government, and the institutional ecosystem, roped in and invested in the price jump, do the rest.
That is not how a company responds to a genuine security discovery. That is how a company manufactures urgency to launch a premium product into a market that didn’t know it needed one. The crisis is the marketing. The consortium is the channel. The fear is the pricing justification.
A first-year vulnerability researcher inflates severity because they don’t know better. It is the job of the expert to help them gain the intelligence necessary to become wise.
Anthropic inflated severity without any apparent reason other than their business model depends on it. That seems worse than just being new or bad at security, because they do know better.
Their own system card proves they had staff who knew that the 72.4% collapses to 4.4%. They published both numbers. They pushed the wrong one into the headlines, into the velvet rope promotional events, and the real one got dropped along the way somehow.
I’m not a lawyer, but cartel is easily the word that comes to mind for me.
Glasswing is sharing more than technical threat information. The partners get early access to a commercial capability withheld from competitors outside the consortium. A company on the Glasswing list gets to scan its own products and its competitors’ products before the rest of the market can. Apple, Google, Microsoft, and Amazon are on the same list. They compete in operating systems, cloud, browsers, and AI. Knowing which of your competitors’ products has unpatched vulnerabilities, before anyone else does, is textbook competitively sensitive information. Strike one.
As much as I’m a huge information sharing guy, I recognize that information exchange alone, even through an intermediary, can constitute concerted action under Section 1 of the Sherman Act. The DOJ argued exactly this in their 2024 Statement of Interest in the Pork Antitrust litigation: exchanges facilitated by intermediaries can have the same anticompetitive effect as direct exchanges among competitors. Anthropic is the intermediary. The partners are competitors. Strike two.
The $100 million in credits creates a financial relationship between the intermediary and the participants that goes beyond information sharing. Anthropic is subsidizing competitors’ use of its product in exchange for validation and participation in a disclosure regime that only Anthropic controls. That is a vendor-mediated exchange where the vendor has commercial interests in the outcome. Strike three.
Yer’outta here.
Selective access to a withheld capability, vendor-funded participation, incumbents shaping disclosure timelines on their own products, and a partner list drawn entirely from the largest companies in the affected industry. That is coordinated market control. The word cartel is for exactly this. The fact that Anthropic framed it as safety does not change the meaning of the word cartel, it reveals why they think they found a loophole.


