Anthropic told the world on April 7 that Claude Mythos turns a fix commit into a working exploit in minutes.
What they didn't say out loud: the disclosure process most of the industry relies on was already leaking exploits, long before Mythos.
We studied historical security fix commits and CVEs data across all programming languages, and spent Q1 watching 100,000+ JavaScript repositories and handing security-patching commits to a blind Sonnet 4.6 agent - no CVE id, no advisory text, nothing a human analyst would normally read first.
Here's what fell out:
→ 𝟵𝟰% of CVEs have a public fix commit before the advisory
→ Median patch gap: 𝟭𝟭 days. Critical CVEs: 𝟯𝟬 days
→ Maven: 𝟭𝟲𝟳 days.
→ 𝟵𝟳 working exploit POCs generated from the diff alone
→ 𝟵𝟵% of security fixes can be applied surgically without breaking code changes using Seal
If your SCA scanner waits for NVD, GitHub Advisory, or OSV, your attackers have already read the commit, prepared an exploit using agents, and still have weeks of a head start.
Today we're launching the 𝗠𝘆𝘁𝗵𝗼𝘀 𝗥𝗲𝗮𝗱𝗶𝗻𝗲𝘀𝘀 𝗣𝗿𝗼𝗴𝗿𝗮𝗺 - for the 99% of companies that aren't inside Anthropic's private Glasswing review.
50 companies get full access to the Seal platform, plus implementation support from our engineers to integrate it into agentic pipelines. Same fixes, weeks earlier than the advisory. No upgrade required. No supply-chain risk. No vendor lock.
Anthropic gave defenders 100 days. We intend to use them.
A link to apply is in the first comment. Or comment with “𝙖𝙜𝙚𝙣𝙩𝙞𝙘 𝙨𝙚𝙖𝙡𝙞𝙣𝙜” and we’ll contact you directly.