- Anthropic’s Mythos AI can detect software vulnerabilities.
- This AI can create its own hacking tools and attack the system.
- The company has made the model available to a limited number of institutions due to security concerns.
AI as Hacker: Artificial Intelligence is changing the world rapidly today. While on one hand it is making the work easier, on the other hand there is increasing concern about its dangers. Recently Anthropic introduced its new AI model Mythos which can identify software vulnerabilities in advance. But during testing, some aspects came to light that surprised everyone.
Could Mythos become a hacker himself?
When Anthropic researcher Nicholas Carlini examined this model, he found out that this AI is not limited to just helping. According to the report, Mythos can identify the flaws present in the digital system as well as take advantage of them.
Not only this, it also has the ability to prepare hacking tools and attack the system on its own. For example, it can also target platforms like Linux. This means that instead of helping humans, this AI can behave like a hacker itself.
How was the reaction within the company?
Logan Graham, head of Anthropic’s red team, said that during testing itself, the team noticed some unusual and risky features in this model. The company’s co-founder and Chief Science Officer Jared Kaplan kept a close eye on it. He told the team that it is important to understand whether this problem is small or can become a threat to the common people. Ultimately he admitted that this AI could pose a risk.
Kaplan and Sam McCandlish then raised their concerns with company CEO Dario Amodei and President Daniela Amodei. It became clear that this was not going to be a normal launch.
What steps were taken for security?
Considering these concerns, the company decided to release this model in a limited manner. Under a special program called Project Glasswing, Mythos has been given access only to selected institutions. Anthropic’s aim is to use this AI for security so that companies can identify and fix weaknesses in their systems before hackers can.
Also read:
What is Emergency SOS feature? Know how it comes in handy in difficult times and what is the setup method in the phone.
