menu_open Columnists
We use cookies to provide some features and experiences in QOSHE

More information  .  Close

AI model Claude Mythos has alarmed the US. Why India must act now

19 0
14.04.2026

Opinion National Interest PoV 50-Word Edit

ThePrint On Camera Videos In Pictures

Society & Culture Around Town Book Excerpts Vigyapanti The Dating Story

More Judiciary Education YourTurn Work With Us Campus Voice

Opinion National Interest PoV 50-Word Edit

ThePrint On Camera Videos In Pictures

Society & Culture Around Town Book Excerpts Vigyapanti The Dating Story

More Judiciary Education YourTurn Work With Us Campus Voice

AI model Claude Mythos has alarmed the US. Why India must act now

India's response to Anthropic's Claude Mythos must begin not with a committee, but with a phone call.

There are moments when a technology does not merely advance the frontier — it erases it. The emergence of Claude Mythos, Anthropic’s new artificial intelligence model, is one such moment. The fact that the United States Treasury Secretary and the Federal Reserve Chair felt it necessary to convene an emergency, closed-door meeting with the chief executives of America’s largest banks ought to concentrate minds — in Washington, certainly, but no less urgently in New Delhi.

Mythos is, on standard benchmarks for coding, logical reasoning, and mathematical problem-solving, the most capable AI model yet built. What has triggered alarm is something rather more consequential than benchmark performance: Mythos can autonomously identify, chain together, and exploit software vulnerabilities at a speed and scale no human team of hackers can match. In controlled testing, it uncovered thousands of previously unknown security flaws across every major operating system and browser — including zero-day vulnerabilities that had lain undetected for over two decades. It did not merely find them. It wrote the exploit code. Autonomously.

Anthropic has, to its considerable credit, chosen not to release the model publicly. Access is being extended to roughly 40 trusted institutional partners — Microsoft, Apple, Google, The Linux Foundation among them — specifically to enable patching of discovered vulnerabilities before wider deployment. This is responsible behaviour. It is also, in the long arc of technological history, a temporary condition. What one company withholds today, state-sponsored programmes in Beijing and Moscow will replicate tomorrow, with fewer scruples about who receives the keys. Treasury Secretary Scott Bessent........

© ThePrint