On April 7, Anthropic announced it was withholding its most capable model from general release. Mythos Preview — Claude's research frontier model — can autonomously find zero-day vulnerabilities in every major operating system and every major web browser, then turn them into working exploits. Not in weeks. Not in days. At machine speed — in hours, not the months that once separated discovery from weaponization.
Twelve organizations are among the first with access — with roughly 40 more participating in supporting roles — under a consortium called Project Glasswing. The rest of the world just found out why that number is deliberately small.
The enforcement gap is the space between pre-launch model review and runtime policy enforcement. A pre-launch review tells you what a model is capable of doing under controlled conditions. Runtime enforcement governs what a deployed agent running that model is actually permitted to do during a live production session — with real tool access, real data, and real consequences. The Trump administration is about to address the first. Nobody has solved the second.
President Trump is expected to sign an AI cybersecurity executive order as soon as Thursday, creating a proposed voluntary pre-launch review period of up to 90 days for frontier AI models and establishing a government clearinghouse — reportedly coordinated through the Treasury Department and cybersecurity agencies including CISA — to identify and remediate vulnerabilities before commercial release. The order was reportedly triggered by Mythos's capabilities and other frontier AI models, including OpenAI's GPT-5.5-Cyber, according to reporting from CNN and Bloomberg ahead of the signing.
This is a real policy response to a real capability. It is also addressing the wrong side of the deployment lifecycle.
What the Mythos Model Can Actually Do
The capability disclosure is not speculative. Anthropic's own red team documentation describes Mythos Preview as "extremely autonomous" in finding software vulnerabilities — capable of chaining browser exploits, executing privilege escalation on Linux systems, and generating remote code execution exploits against production server software. Thousands of vulnerabilities that would challenge even the most experienced human bug hunters.
The speed differential is what changed the threat model. Defenders have historically relied on the time gap between vulnerability discovery and weaponization — a zero-day might be found and kept private for months while exploit code was developed. Mythos collapses that window dramatically. Engineers with no formal security background asked it to find remote code execution vulnerabilities and came back the next morning to working exploits already generated.
Google Threat Intelligence Group confirmed on May 11, 2026 the first documented case of an AI-developed zero-day exploit used in a planned mass exploitation campaign. A threat actor used an AI model to discover and weaponize a 2FA bypass vulnerability in a widely-deployed open-source web-based system administration tool. Google's GTIG identified the attack before the mass exploitation event launched — recognizing the AI-generated exploit by its characteristic markers: highly annotated Python code with educational docstrings, and a hallucinated (non-existent) CVSS score. The threat actor apparently didn't notice the hallucinated score.
Google likely stopped that specific campaign. The technique is now documented.
Why Pre-Launch Review Doesn't Close the Enforcement Gap
The Trump EO's proposed review framework is designed to give government visibility into frontier model capabilities before the public gets access. The cybersecurity clearinghouse model — voluntary participation, coordinated disclosure, government-industry collaboration — is a reasonable starting point for pre-deployment screening.
Here is the structural problem: a pre-launch review examines what a model can do. It cannot govern what a deployed agent running that model actually does in production.
The enforcement gap is not at the model level. It is at the execution level.
An enterprise team that clears the government's pre-launch review process has passed one gate. They have not addressed what happens when that model runs inside an agent with access to production systems, code execution environments, network interfaces, or external APIs — all of which are normal deployment contexts. An ungoverned agent running on Mythos-class capabilities with a code execution tool can scan a target, identify a zero-day, and generate a working exploit within a single execution arc. No human in the loop. No enforcement layer to fire. The pre-launch clearinghouse reviewed the model's capabilities in isolation. It does not see your production deployment.
That gap is architectural. The EO addresses disclosure before deployment. The enforcement gap persists after it.
What Teams Deploying Frontier Agents Need to Verify Now
Before Thursday's signing generates compliance noise, here is what matters operationally for teams deploying Claude models or other frontier AI agents:
Map what the agent can reach. Every system, API, and tool your agent has access to is a potential attack surface when the underlying model can identify and weaponize vulnerabilities. An agent running on a Mythos-class model with access to a code execution environment, network tooling, or file system access is operating at a level of risk that observability dashboards do not address. The signal-domain boundary is the architectural control that defines what data and systems the agent can reach at all — restrict it to only what the agent's function requires.
Confirm pre-execution policy enforcement is in place. Monitoring tools catch problems after an agent has already run a tool call. For agents with Mythos-class reasoning capabilities, that is too late. You need input validation policies that evaluate intent and scope before execution begins — before the tool call fires, not after the action completes.
Test whether your kill switch fires on the right signals. If an agent starts querying network topology, writing to unexpected directories, or chaining tool calls in patterns that look like reconnaissance, you need a hard stop — not a log entry. A Kill Switch policy terminates the execution arc immediately when a configured threshold is crossed. Most teams have monitoring. Fewer have pre-execution enforcement. Check which one your current stack actually provides.
Ensure your execution record is defensible. When the government's clearinghouse calls post-incident (and it will), "we were monitoring" is insufficient. You need a complete, durable record of what the agent queried, what tools it called, what was approved, and what was blocked — structured for forensic review. That is an audit trail, not a log file.
How Waxell Runtime Handles This
Waxell Runtime is the enforcement layer between a model's capabilities and your production systems. It does not replace the government's pre-launch review process — that screens what a model can theoretically do in isolation. Waxell Runtime governs what a deployed agent is actually permitted to do during a live production session.
For frontier model deployments specifically, three policy types address the enforcement gap directly:
Kill Switch policies terminate an agent's execution arc when it crosses a defined threshold — before the action completes. If an agent's tool call sequence begins resembling a vulnerability scan, a privilege escalation attempt, or a network reconnaissance pattern, execution stops. The policy fires pre-execution, not post-run. It is the difference between observing that an agent did something it should not have and preventing that action from completing.
Content policies block inputs and outputs that match exploitation patterns. Prompt injection attempts, code generation targeting specific vulnerability classes, and output structures encoding exploit payloads can all be caught at the policy layer before they reach the model's context or leave the agent's output boundaries. The security guarantees come from enforcement, not from model alignment alone.
Control policies enforce scope limits on what a deployed agent can access at all. The signal-domain boundary is the architectural equivalent of least-privilege networking — the agent only has visibility into the data and systems explicitly permitted for its function. A billing agent does not need network access. A code review agent does not need production database credentials. These boundaries are defined as Kill Switch and Control policies, not inherited defaults.
Waxell Runtime ships with 26 policy categories and integrates with over 200 LLM providers and agent frameworks without changes to your agent code. Two lines of initialization. No rebuilds required. The governance layer sits above the agent — it does not require rewriting the agent itself.
The EO's clearinghouse will tell you whether the underlying model passed pre-launch review. Waxell Runtime enforces what happens after your agent is deployed. Those are different problems. Only one of them has a regulatory answer coming Thursday.
Get access to Waxell Runtime to see what 26 policy categories look like in your environment.
FAQ
Does the Trump AI cybersecurity executive order apply to enterprise companies using frontier AI models?
The EO as currently described applies directly to AI model providers — requiring voluntary pre-launch model sharing with a government cybersecurity clearinghouse. Enterprise teams deploying those models are not directly covered by the order, but they inherit the security and compliance responsibility for how frontier models are used in production. The enforcement gap at runtime is entirely an enterprise responsibility. The government clearinghouse does not extend into your deployment.
What is Anthropic Mythos and why does it matter for enterprise AI security?
Anthropic Mythos Preview is a frontier AI model capable of autonomously discovering and weaponizing zero-day vulnerabilities in production software — including every major operating system and web browser — generating working exploits at machine speed. Anthropic has restricted access to a core group of technology partners under Project Glasswing, a consortium coordinating defensive use of the model ahead of any broader release. The Trump AI EO was reportedly triggered in part by Mythos and other frontier AI models. Enterprises deploying Claude-class models or other frontier agents should treat Mythos's documented capabilities as the current frontier for what runtime agent governance needs to address.
What is a Kill Switch policy in AI agent governance?
A Kill Switch policy is a runtime enforcement rule that terminates an agent's execution arc when a defined threshold is crossed — before a harmful or out-of-scope action completes. Unlike a monitoring alert, which fires after the fact, a Kill Switch fires pre-execution and stops the agent mid-session. For Mythos-class deployments, where exploitation sequences can complete at machine speed, the distinction between pre-execution enforcement and post-run observation is the difference between stopping an attack and documenting it.
Can observability tools like LangSmith or Arize catch Mythos-class exploitation attempts?
Observability tools record what agents do. They do not prevent it. LangSmith, Arize, Helicone, and similar platforms surface traces and logs after execution. A Mythos-class model operating at machine speed can complete an exploitation sequence faster than a human can review an alert. The enforcement layer must operate pre-execution — before the tool call fires, not in the post-run dashboard. Monitoring is necessary. It is not sufficient.
What specifically did Google's May 2026 zero-day finding confirm?
Google Threat Intelligence Group identified a threat actor who used an AI model to discover and weaponize a 2FA bypass vulnerability in a widely-used open-source web-based system administration tool, in preparation for a planned mass exploitation campaign. Google's detection was based on the AI-generated exploit's distinctive characteristics: educational docstrings, a hallucinated CVSS score that did not correspond to any real CVE, and a textbook Pythonic coding structure characteristic of LLM training data. GTIG disrupted the campaign through coordinated disclosure with the affected vendor. This is the first publicly documented case of an AI-developed zero-day used for a planned real-world mass exploitation event.
What should enterprise teams do before the Trump AI EO takes effect?
Four concrete steps: (1) Map every system, tool, and API your frontier agents can reach and remove access that is not required for the agent's defined function. (2) Add pre-execution policy enforcement — Kill Switch and Content policies — for any agent running on a Mythos-class or similarly capable model. (3) Verify your kill switch fires pre-execution, not post-run. (4) Confirm your execution records are complete and defensible for forensic review, not just operational logs. The government clearinghouse will eventually ask what controls you had in place at runtime.
Sources:
- Trump could sign AI executive order as soon as Thursday — CNN Business, May 20, 2026
- Trump Set to Sign AI Cybersecurity Directive as Soon as Thursday — Bloomberg, May 21, 2026
- Scoop: Trump AI executive order seeks early government access to frontier models — Axios, May 20, 2026
- Anthropic withholds Mythos Preview model because its hacking is too powerful — Axios, April 7, 2026
- What Anthropic's Mythos Means for the Future of Cybersecurity — Schneier on Security, April 2026
- Anthropic's Mythos Has Landed: Here's What Comes Next for Cyber — Dark Reading
- Google says it likely thwarted effort by hacker group to use AI for 'mass exploitation event' — CNBC, May 11, 2026
- Google says criminals used AI-built zero-day in planned mass hack spree — The Register, May 11, 2026
- Google Detects First AI-Generated Zero-Day Exploit — SecurityWeek, May 11, 2026
Top comments (0)