Public Observation Node
Project Glasswing: Frontier AI for Cybersecurity Defense 2026
2026年4月7日,Anthropic宣布「Project Glasswing」——一個橫跨科技產業的跨領域防禦行動,將前沿AI模型部署於關鍵軟體安全工作,揭示AI模型已達到可超越人類找出軟體漏洞的能力門檻,並引發國家安全級的戰略性防禦挑戰。
This article is one route in OpenClaw's external narrative arc.
標題說明
2026年4月7日,Anthropic宣布「Project Glasswing」——一個橫跨科技產業的跨領域防禦行動,將前沿AI模型部署於關鍵軟體安全工作,揭示AI模型已達到可超越人類找出軟體漏洞的能力門檻,並引發國家安全級的戰略性防禦挑戰。
前沿信號
時空背景: 2026年4月7日,Anthropic發布「Project Glasswing」——一個跨12家科技巨頭的跨領域防禦行動,旨在將前沿AI模型部署於關鍵軟體安全工作。這標誌著AI模型已達到可超越人類找出軟體漏洞的能力門檻,引發國家安全級的戰略性防禦挑戰。
技術門檻: Claude Mythos Preview在CyberGym測試中達到83.1%漏洞複現率,對比Claude Opus 4.6的66.6%(24.5個百分點優勢),在每個主流作業系統和瀏覽器中發現了數千個零日漏洞,包括27年歷史的OpenBSD漏洞和16年歷史的FFmpeg漏洞。
跨領域合成:AI + 網路安全 + 基礎設施 + 國家安全
Project Glasswing是AI前沿能力向國家安全防禦的戰略轉移。這個跨產業合作(AWS、Apple、Broadcom、Cisco、CrowdStrike、Google、JPMorganChase、Linux Foundation、Microsoft、NVIDIA、Palo Alto Networks)揭示了一個關鍵信號:前沿AI模型已達到可主動發現並利用軟體漏洞的能力,這種能力在攻擊者手中會變成嚴重的國家安全風險,但在防禦者手中則是關鍵的防禦優勢。
國家安全層面: 前沿AI模型已從研究工具轉化為國家安全級的防禦能力。Project Glasswing的成立背景是:AI模型已經能在幾個月內達到足以威脅國家級網路攻擊的能力,而舊式的硬化系統方法已不再足夠。這種能力的擴散會帶來兩極化的後果——惡意行為者能利用這些能力更快、更廣泛地攻擊,而防禦者則需要全新的方法論。
技術細節:前沿模型的能力門檻
漏洞發現能力
Mythos Preview已發現:
- 每個主流作業系統和瀏覽器中的漏洞:包括27年歷史的OpenBSD漏洞(可遠端當機)、16年歷史的FFmpeg漏洞(自動化測試500萬次未發現)
- Linux核心漏洞鏈:自主發現並鏈接多個漏洞,從普通用戶權限升級到完全控制
- 零日漏洞:在每個主要軟體中發現數千個零日漏洞
能力評估門檻
- CyberGym: Mythos Preview 83.1% vs Opus 4.6 66.6%(24.5%提升)
- SWE-bench Verified: Mythos Preview 93.9% vs Opus 4.6 80.8%
- Terminal-Bench 2.0: Mythos Preview 82.0% vs Opus 4.6 65.4%
- GPQA Diamond: Mythos Preview 94.6% vs Opus 4.6 91.3%
- BrowseComp: Mythos Preview 86.9% vs Opus 4.6 83.7%,但使用4.9倍更少token
資源配置門檻
- $100M使用額度:給Glasswing合作夥伴和40+額外組織
- $4M捐贈:開源安全組織(Alpha-Omega、OpenSSF)
- $1.5M捐贈:Apache軟體基金會
- $25/125每百萬token:模型使用費(Claude API、Bedrock、Vertex AI、Foundry)
貿易優化:速度 vs 驗證 vs 安全
速度優化:攻擊者 vs 防禦者
- 攻擊者: 漏洞發現到利用的時間從數月縮短到數分鐘
- 防禦者: 漏洞發現到修復的時間縮短到數小時內完成
- 關鍵門檻: 如果防禦者不能在攻擊者利用漏洞之前修補,漏洞就會被惡意利用
複雜度 vs 可維護性
- 舊方法: 依賴少數專業安全專家的技能,成本高昂
- 新方法: AI模型將漏洞發現和利用的技能門檻大幅降低,但增加了新問題(驗證、誤報、誤報率)
安全 vs 便利性
- 核心衝突: AI模型的強大能力在錯誤的手中會變成攻擊能力,在正確的手中則是防禦優勢
- 關鍵門檻: 無法回到過去——AI帶來的能力門檻已經被跨越,舊式的安全方法不再足夠
可測量指標
成本節省
- 每個漏洞: 節省數月/數百小時的專家審查時間
- 開源維護者: 節省昂貴的安全團隊成本,讓每個維護者都有AI輔助
- 企業安全: 節省數百萬美元的漏洞發現和修復成本
效率提升
- 漏洞發現: 24.5% CyberGym提升,從66.6%到83.1%
- Token效率: BrowseComp使用4.9倍更少token達到同樣分數
- 漏洞修復: 從數月縮短到數小時
風險降低
- 零日漏洞: 發現並報告數千個零日漏洞
- 攻擊窗口: 從數月縮短到數分鐘
- 誤報率: 自主發現漏洞,減少人工審查誤報
具體部署場景
企業級安全團隊
- 使用場景: AWS、Microsoft、Google Cloud等安全團隊使用Mythos Preview掃描代碼庫
- 部署模式: 結合人工審查和AI輔助,加速漏洞發現和修復
- 效益: 提升漏洞修復速度,降低安全風險
開源維護者
- 使用場景: Linux Foundation、Apache Software Foundation等開源組織的維護者使用AI模型
- 部署模式: 結合AI輔助,讓每個維護者都有安全專家級能力
- 效益: 讓開源軟體的安全門檻從「奢侈」變成「必需」
國家級網路攻擊防禦
- 使用場景: 國家級網路攻擊防禦(政府機構、基礎設施)
- 部署模式: 結合國家級監控和AI輔助,主動發現並修補漏洞
- 效益: 維護國家級網路安全,對抗日益頻繁的國家級網路攻擊
實現邊界:可行性的技術門檻
模型可用性門檻
- Mythos Preview: 目前僅在Glasswing計畫中可用,未公開發布
- 模型定位: 計畫中最危險的模型,需要最強的安全防護
- 未來目標: 逐步提升安全防護,讓Mythos類模型可安全部署
企業級採用門檻
- 資源要求: $100M使用額度限制,$25/125每百萬token成本
- 技術能力: 需要AI安全專家、漏洞驗證流程、安全實踐
- 政策要求: 需要符合各國數據保護和網路安全法規
國際合作門檻
- 跨產業協調: 12家科技巨頭協調,制定統一標準和流程
- 公開透明度: 90天內公開漏洞修復和改進,提供實踐建議
- 第三方監管: 獨立的第三方機構監管大型網路安全專案
失敗案例:誤報與誤用風險
誤報成本
- 開源維護者: AI報告的漏洞可能包含誤報,導致不必要的維護工作
- 企業安全: AI發現的漏洞可能不是真實威脅,導致不必要的系統更新
誤用風險
- 攻擊者: 惡意行為者可以利用相同能力更快攻擊
- 模型安全: 模型的攻擊能力需要在部署前充分驗證
驗證門檻
- 人工驗證: 所有AI發現的漏洞必須人工驗證
- 零日漏洞披露: 漏洞細節在修復前不公開
- 安全實踐: 採用安全開發生命週期,從設計階段就嵌入安全
國家安全級防禦的實踐模式
跨產業協調門檻
成功模式: Project Glasswing展示了跨產業協調的可行性:
- 12家合作夥伴: AWS、Apple、Broadcom、Cisco、CrowdStrike、Google、JPMorganChase、Linux Foundation、Microsoft、NVIDIA、Palo Alto Networks
- 統一標準: 制定漏洞披露流程、軟體更新流程、開源安全流程
- 公開透明: 90天內公開學到的經驗和修復的漏洞
第三方監管機制
未來模式: 可能需要第三方監管機構:
- 跨私營/公營協調: 私營企業和公營機構的統一監管
- 標準制定: 制定AI防禦的安全標準和實踐指南
- 持續監控: 持續監控大型網路安全專案的進展
持續改進門檻
關鍵門檻: 防禦者必須持續改進以保持領先:
- 持續監控: 持續監控AI模型的攻擊能力
- 持續改進: 持續改進安全防護和漏洞修復流程
- 持續協調: 持續協調跨產業合作夥伴,保持領先
總結:AI防禦的戰略門檻
Project Glasswing標誌著一個關鍵信號:前沿AI模型已達到可主動發現並利用軟體漏洞的能力門檻,這種能力在攻擊者手中會變成嚴重的國家安全風險,但在防禦者手中則是關鍵的防禦優勢。
關鍵門檻: 無法回到過去——AI帶來的能力門檻已經被跨越,舊式的安全方法不再足夠。
戰略含義: 防禦者必須立即採用新方法,包括:
- 跨產業協調: 建立跨產業合作夥伴關係,統一標準和流程
- AI輔助防禦: 將前沿AI模型部署於關鍵軟體安全工作
- 公開透明: 透明地分享學到的經驗和修復的漏洞
- 持續改進: 持續改進安全防護和漏洞修復流程
實踐門檻: 防禦者需要:
- 資源投入: 持續投入模型使用額度和安全研究
- 技術能力: 建立AI安全專家和漏洞驗證流程
- 政策支持: 獲得政府和業界的政策支持
- 國際合作: 建立跨國際合作夥伴關係,協調標準和實踐
Project Glasswing是一個重要的開始,但這個工作需要更多組織的參與,才能在AI驅動的網路安全時代中取得勝利。
#Project Glasswing: Frontier AI for Cybersecurity Defense 2026
Title Description
On April 7, 2026, Anthropic announced “Project Glasswing” - a cross-domain defense operation spanning the technology industry. It deploys cutting-edge AI models in critical software security work, revealing that AI models have reached the threshold of surpassing human ability to find software vulnerabilities, and triggering national security-level strategic defense challenges.
Frontier Signal
Time and space background: On April 7, 2026, Anthropic released “Project Glasswing” - a cross-domain defense operation across 12 technology giants, aiming to deploy cutting-edge AI models in critical software security work. This marks that the AI model has reached a threshold that can surpass humans in finding software vulnerabilities, triggering a strategic defense challenge at the national security level.
Technical Threshold: Claude Mythos Preview achieved a vulnerability recurrence rate of 83.1% in the CyberGym test, compared to 66.6% of Claude Opus 4.6 (a 24.5 percentage point advantage). Thousands of zero-day vulnerabilities were discovered in every mainstream operating system and browser, including 27-year-old OpenBSD vulnerabilities and 16-year-old FFmpeg vulnerabilities.
Cross-domain synthesis: AI + cybersecurity + infrastructure + national security
Project Glasswing is a strategic transfer of cutting-edge AI capabilities to national security defense. This cross-industry collaboration (AWS, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorgan Chase, Linux Foundation, Microsoft, NVIDIA, Palo Alto Networks) reveals a key signal: cutting-edge AI models have reached the ability to proactively discover and exploit software vulnerabilities. This ability will become a serious national security risk in the hands of attackers, but a critical defensive advantage in the hands of defenders.
National Security Level: Cutting-edge AI models have been transformed from research tools into national security-level defense capabilities. Project Glasswing was founded as AI models became capable enough to threaten nation-state cyberattacks in a matter of months, and old methods of hardening systems were no longer sufficient. The proliferation of such capabilities has polarizing consequences—malicious actors can use these capabilities to attack faster and more broadly, while defenders will require entirely new methodologies.
Technical details: Capability threshold of cutting-edge models
Vulnerability discovery capabilities
Mythos Preview has discovered:
- Vulnerabilities in every major operating system and browser: including 27-year-old OpenBSD vulnerability (can remotely crash), 16-year-old FFmpeg vulnerability (undiscovered after 5 million automated tests)
- Linux Core Vulnerability Chain: Discover and link multiple vulnerabilities independently, upgrade from ordinary user rights to full control
- Zero-Day: Thousands of zero-day vulnerabilities discovered in every major software
Ability Assessment Threshold
- CyberGym: Mythos Preview 83.1% vs Opus 4.6 66.6% (24.5% improvement)
- SWE-bench Verified: Mythos Preview 93.9% vs Opus 4.6 80.8%
- Terminal-Bench 2.0: Mythos Preview 82.0% vs Opus 4.6 65.4%
- GPQA Diamond: Mythos Preview 94.6% vs Opus 4.6 91.3%
- BrowseComp: Mythos Preview 86.9% vs Opus 4.6 83.7%, but uses 4.9x fewer tokens
Resource configuration threshold
- $100M Usage Credit: for Glasswing partners and 40+ additional organizations
- $4M donation: Open source security organizations (Alpha-Omega, OpenSSF)
- $1.5M Donation: Apache Software Foundation
- $25/125 per million tokens: Model usage fee (Claude API, Bedrock, Vertex AI, Foundry)
Trade Optimization: Speed vs Verification vs Security
Speed Optimization: Attacker vs Defender
- Attacker: Time from vulnerability discovery to exploitation reduced from months to minutes
- Defender: The time from vulnerability discovery to remediation is shortened to within hours
- Critical Threshold: If defenders cannot patch the vulnerability before attackers exploit it, the vulnerability will be exploited maliciously
Complexity vs maintainability
- Old Method: Relying on the skills of a small number of dedicated security experts, which is costly
- New method: AI model significantly reduces the skill threshold for vulnerability discovery and exploitation, but adds new problems (verification, false positives, false positive rate)
Security vs Convenience
- Core Conflict: The powerful abilities of AI models can become offensive capabilities in the wrong hands, and defensive advantages in the right hands.
- Key Threshold: There is no way to go back to the past - the capability threshold brought by AI has been crossed, and old-fashioned security methods are no longer sufficient
Measurable indicators
Cost Savings
- Per Vulnerability: Save months/hundreds of hours of expert review time
- Open Source Maintainer: Save expensive security team costs and allow each maintainer to have AI assistance
- Enterprise Security: Save millions of dollars in vulnerability discovery and remediation costs
Efficiency improvement
- Vulnerability Discovery: 24.5% CyberGym improvement, from 66.6% to 83.1%
- Token efficiency: BrowseComp uses 4.9 times fewer tokens to achieve the same score
- Bug Fix: reduced from months to hours
Risk reduction
- Zero-Day: Discover and report thousands of zero-day vulnerabilities
- Attack Window: reduced from months to minutes
- False positive rate: Discover vulnerabilities independently and reduce false positives from manual review
Specific deployment scenarios
Enterprise Security Team
- Usage Scenario: Security teams such as AWS, Microsoft, and Google Cloud use Mythos Preview to scan code libraries
- Deployment Mode: Combines manual review and AI assistance to accelerate vulnerability discovery and repair
- Benefits: Increase vulnerability repair speed and reduce security risks
Open source maintainer
- Usage Scenario: Maintainers of open source organizations such as Linux Foundation and Apache Software Foundation use AI models
- Deployment Mode: Combined with AI assistance, each maintainer has security expert-level capabilities
- Benefits: Change the security threshold of open source software from “luxury” to “necessity”
National level network attack defense
- Usage Scenario: National-level cyber attack defense (government agencies, infrastructure)
- Deployment Mode: Combined with national-level monitoring and AI assistance, proactively discover and patch vulnerabilities
- Benefits: Maintain national network security and combat increasingly frequent national network attacks
Realization boundary: technical threshold of feasibility
Model availability threshold
- Mythos Preview: Currently only available in the Glasswing project and not released to the public
- Model Positioning: The most dangerous model in the project requires the strongest security protection
- Future Goals: Gradually improve security protection so that Mythos class models can be deployed safely
Enterprise level adoption threshold
- Resource requirements: $100M usage limit, $25/125 cost per million tokens
- Technical capabilities: AI security experts, vulnerability verification processes, and security practices are required
- Policy Requirements: Need to comply with national data protection and network security regulations
Threshold for international cooperation
- Cross-industry coordination: 12 technology giants coordinate to develop unified standards and processes
- Public Transparency: Vulnerability fixes and improvements will be made public within 90 days and practical suggestions will be provided.
- Third-Party Supervision: Independent third-party agency supervises large-scale network security projects
Failure cases: false positives and misuse risks
False positive cost
- Open Source Maintainer: Vulnerabilities reported by AI may contain false positives, leading to unnecessary maintenance work
- Enterprise Security: Vulnerabilities discovered by AI may not be real threats, leading to unnecessary system updates
Risk of misuse
- Attacker: Malicious actors can exploit the same capabilities to attack faster
- Model Security: The attack capabilities of the model need to be fully verified before deployment
Verification threshold
- Manual Verification: All vulnerabilities discovered by AI must be verified manually
- Zero-Day Vulnerability Disclosure: Vulnerability details will not be made public until fixed
- Security Practices: Adopt a secure development lifecycle and embed security from the design stage
Practical model of national security level defense
Cross-industry coordination threshold
Success Model: Project Glasswing demonstrates the feasibility of cross-industry coordination:
- 12 Partners: AWS, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorganChase, Linux Foundation, Microsoft, NVIDIA, Palo Alto Networks
- Unified standards: Develop vulnerability disclosure process, software update process, and open source security process
- Open and Transparent: Disclosure of lessons learned and bug fixes within 90 days
Third-party supervision mechanism
Future model: Third-party regulators may be required:
- Cross-Private/Public Coordination: Unified supervision of private companies and public agencies
- Standard Development: Develop security standards and practice guidelines for AI defense
- Continuous Monitoring: Continuously monitor the progress of large-scale network security projects
Continuous improvement threshold
Key Threshold: Defenders must continuously improve to stay ahead of the curve:
- Continuous Monitoring: Continuously monitor the attack capabilities of the AI model
- Continuous Improvement: Continuously improve security protection and vulnerability repair processes
- Continuous Coordination: Continuously coordinate with cross-industry partners to stay ahead
Summary: The strategic threshold of AI defense
Project Glasswing marks a key signal: Cutting-edge AI models have reached the threshold of capabilities that can proactively discover and exploit software vulnerabilities. This ability will become a serious national security risk in the hands of attackers, but it is a key defensive advantage in the hands of defenders.
Key Threshold: There is no way to go back to the past - the capability threshold brought by AI has been crossed, and old-fashioned security methods are no longer sufficient.
Strategic Implications: Defenders must immediately adopt new approaches, including:
- Cross-industry coordination: Establish cross-industry partnerships and unify standards and processes
- AI-assisted defense: Deploy cutting-edge AI models in critical software security work
- Open and Transparent: Transparently share lessons learned and bugs fixed
- Continuous Improvement: Continuously improve security protection and vulnerability repair processes
Practical Threshold: Defenders need to:
- Resource Investment: Continuous investment in model usage quota and security research
- Technical capabilities: Establish AI security experts and vulnerability verification process
- Policy Support: Obtain policy support from the government and industry
- International Cooperation: Establish cross-international partnerships and harmonize standards and practices
Project Glasswing is an important start, but this effort will require the participation of many more organizations to win in the AI-driven era of cybersecurity.