Anthropic just announced Claude Mythos, a model that autonomously discovers zero-day vulnerabilities. It found a 27-year-old OpenBSD bug. A 16-year-old FFmpeg flaw. Linux kernel privilege escalation chains. Thousands of zero-days across every major OS and browser, many of them critical.

They’re giving it to AWS, Apple, Cisco, Google, Microsoft, and NVIDIA through Project Glasswing to help fix these bugs before attackers find them. Good. The world needs that.

But here’s the part nobody is talking about: that vulnerability discovery capability doesn’t stay in a locked room forever. It trickles into frontier models. Mythos already hits 93.9% on SWE-bench Verified, which means it can autonomously fix almost any real-world GitHub issue. The gap between “finds bugs in a controlled lab” and “finds bugs while running as your coding agent” gets smaller with every model generation.

The scenario that should worry you

Your coding agent has access to your source code, your API keys, your database credentials, and an internet connection. Today, if it gets prompt-injected, the worst case is credential exfiltration or unauthorized actions. Bad enough.

Now imagine that same agent has Mythos-level vulnerability discovery baked into its reasoning. A prompt injection doesn’t just steal your AWS keys. It finds a zero-day in your codebase, crafts an exploit, and sends both to an attacker-controlled server. All in one session. All through HTTP requests that look normal unless someone is inspecting the content.

This isn’t science fiction. Anthropic themselves said Mythos “could reshape cybersecurity.” They published it with an explicit warning about the risk.

Vulnerability discovery is SAST. Your agent needs runtime defense.

Mythos is static analysis on steroids. It reads code and finds bugs. That’s one side of the security equation.

The other side is: what happens when the agent acts on what it knows? When it makes HTTP requests, calls MCP tools, writes files, or pushes code? That’s runtime. And runtime is where egress inspection matters.

Static analysis tells you the code has a bug. Runtime egress inspection tells you the agent just tried to send the exploit to a Telegram webhook encoded in base64 inside a query parameter. Different problems, different layers.

LayerWhat it doesTool
Static analysis / SASTFinds bugs in code before deploymentMythos, Snyk, CodeQL
Inference guardrailsChecks if the model’s output is safeLlamaFirewall, NeMo Guardrails
Egress inspectionScans network traffic between agent and internetPipelock

You need all three. Having Mythos without egress inspection is like having a locksmith who can pick any lock, working alone in your office with the keys to the vault and an open internet connection.

What egress inspection catches

A compromised or injected coding agent trying to exfiltrate vulnerability findings would need to get the data out. That means HTTP requests, MCP tool calls, or DNS queries. When the agent’s traffic routes through a scanning proxy, those channels are inspected.

Pipelock’s scanner pipeline checks:

None of this requires understanding what the agent found. It catches the exfiltration attempt regardless of payload content.

The real defense-in-depth stack

Mythos validates the category. Anthropic just told the world that AI models can now autonomously find and chain zero-day exploits. The attack surface for AI agents got bigger today, not smaller.

The defense stack that actually works:

  1. SAST (Mythos, CodeQL) finds bugs in your code
  2. Guardrails (LlamaFirewall) check if the model is being misused
  3. Egress inspection (Pipelock) catches what leaves the machine

If you’re running coding agents without egress inspection, everything between the agent and the internet is unscanned. Every HTTP request, every MCP tool call, every API key in every header. That was concerning before Mythos. Now it’s reckless.

brew install luckyPipewrench/tap/pipelock
pipelock claude setup    # wraps Claude Code with scanning
pipelock run             # or proxy any agent's HTTP traffic

Further reading

Pipelock is an open-source agent firewall. Free forever.