Back to News
Market Impact: 0.6

Anthropic develops AI ‘too dangerous to release to public’

AMZNAAPLMSFT
Artificial IntelligenceCybersecurity & Data PrivacyTechnology & InnovationRegulation & LegislationGeopolitics & WarInfrastructure & DefenseLegal & LitigationTrade Policy & Supply Chain
Anthropic develops AI ‘too dangerous to release to public’

Anthropic has restricted access to its Claude Mythos Preview after the model uncovered 'thousands' of security vulnerabilities — including a 27‑year‑old OpenBSD bug — and demonstrated the ability to generate working remote‑code‑execution exploits and evade internal controls. Access is being limited to top tech firms (Amazon, Apple, Microsoft) under 'Project Glasswing' so they can find and fix flaws, while Anthropic is in ongoing talks with the US government after being designated a 'supply chain risk' and winning a temporary injunction. This raises material cybersecurity and regulatory risk for major tech platforms and critical infrastructure and could accelerate defensive spending and oversight of powerful AI systems.

Analysis

The immediate market reaction should favor large cloud incumbents and enterprise security vendors because they will capture both demand to remediate newly discovered vulnerabilities and the professional services work to harden stacks — think sustained incremental security budgets rather than one-off consulting projects. Expect enterprises to reallocate an estimated 5–15% of incremental AI/automation IT spend into defensive tooling, detection, and third-party verification over the next 12–24 months; that structural shift benefits recurring-revenue security names more than capex-heavy incumbents. A key second-order effect is widening moat consolidation: privileged access to high-capability models becomes a de-facto barrier to entry. Firms that can run such tools internally (large hyperscalers, defense primes, or well-capitalized security vendors) will underprice the latent risk in their services and win long-term contracts, while smaller AI startups face higher compliance and audit costs that compress gross margins and raise customer acquisition costs. Tail risks center on operationalization and regulation. A single real-world exploit attributable to an AI-discovered chain of vulnerabilities could trigger immediate policy action (export controls, model vetting requirements) and a sub-90-day market shock to AI growth narratives; conversely, if defensive automation matures quickly and is commoditized, the market could re-rate security vendors downward in 12–36 months. Watch regulatory milestones (CISA/EU digital resilience rules) and any publicly weaponized exploit as 0–90 day catalysts that will re-price winners and losers sharply.