New research suggests that the ability to discover software vulnerabilities using artificial intelligence is becoming both inexpensive and widely accessible, raising concerns that advanced cyber capabilities may be spreading faster than anticipated.
A study by Vidoc Security demonstrates that vulnerability discovery techniques similar to those highlighted in Anthropic’s recent “Mythos” work can be reproduced using publicly available AI models. By leveraging GPT-5.4 and Claude Opus 4.6 within an open-source framework called opencode, researchers were able to replicate key findings for under $30 per scan, without access to Anthropic’s internal systems or restricted programs.
Anthropic had earlier positioned its Mythos research as highly sensitive, limiting access to a small group of major organizations and prompting concern across policy and financial circles. Reports indicated that senior figures, including Scott Bessent and Jerome Powell, discussed the implications alongside leading financial executives. The term “vulnpocalypse” resurfaced in cybersecurity discussions, reflecting fears of large-scale AI-driven exploitation.
The Vidoc team sought to test whether such capabilities were truly restricted. Using patched vulnerability examples referenced in Anthropic’s public materials, they examined issues affecting a file-sharing protocol, a security-focused operating system’s networking components, widely used video-processing software, and cryptographic libraries used for identity verification online.
Across three independent runs, both models successfully reproduced two of the documented vulnerability cases each time. Claude Opus 4.6 also independently rediscovered a flaw in OpenBSD in all three attempts, while GPT-5.4 failed to identify that specific issue. In other instances, including vulnerabilities tied to FFmpeg and wolfSSL, the systems correctly identified relevant code regions but did not fully determine the root cause.
The methodology closely mirrored workflows described by Anthropic. Instead of relying on a single prompt, the system first analyzed entire codebases, divided them into smaller segments, and ran parallel detection processes. These processes filtered meaningful signals from noise and cross-checked findings across files. Importantly, the selection of code segments was automated through earlier planning steps, rather than manually guided.
Despite these results, the study underlines a clear distinction. Anthropic’s system reportedly went beyond identifying vulnerabilities by constructing detailed exploit pathways, such as chaining code fragments across multiple network packets to achieve full remote control of a system. The public models, while capable of locating weaknesses, did not reach that level of execution.
According to researcher Dawid Moczadło, this indicates a new turn of events in cybersecurity economics. The most resource-intensive part of the process, identifying credible vulnerability signals, is becoming accessible to anyone with standard API access. However, validating those findings and converting them into reliable security insights or exploit strategies remains significantly more complex.
Anthropic itself has acknowledged that traditional benchmarks like Cybench are no longer sufficient to measure modern AI cyber capabilities, noting that its Mythos system exceeded those standards. The company estimated that comparable capabilities could become widespread within six to eighteen months.
The Vidoc findings suggest that, at least for vulnerability discovery, this transition may already be underway. By publishing their methodology, prompts, and results, the researchers highlight how open tools and commercially available models can replicate parts of workflows once considered highly restricted.
For organizations, the implications are instrumental. As AI reduces the cost and effort required to uncover software flaws, defenders may need to adopt continuous monitoring, faster remediation cycles, and deeper behavioral analysis. The challenge is no longer just identifying vulnerabilities, but managing the scale and speed at which they can now be discovered.
The attack began on April 6 and continued into April 7, impacting core digital infrastructure used for emergency response and municipal operations. Officials said the incident significantly affected their ability to manage essential services, including administrative and public-facing functions.
Governor Tim Walz responded by signing an executive order authorizing the Minnesota National Guard to support recovery efforts.
"Cyberattacks are an evolving threat that can strike anywhere, at any time," said Governor Walz. "Swift coordination between state and local experts matters in these moments. That's why I am authorizing the National Guard to support Winona County as they work to protect critical systems and maintain essential services."
County officials confirmed that teams have been working continuously since detecting the breach. The response involves coordination with Minnesota Information Technology Services, the Minnesota Bureau of Criminal Apprehension, the League of Minnesota Cities, the Federal Bureau of Investigation, and external cybersecurity experts.
Despite these efforts, authorities acknowledged that the scale and complexity of the attack exceeded both internal capabilities and commercial support, prompting a formal request for assistance from the National Guard.
Under the executive order, the Adjutant General is authorized to deploy personnel, equipment, and additional resources to assist with the response. The state can also procure necessary services, with costs covered through Minnesota’s general fund.
The order is currently active and will remain in place until the situation stabilizes or is officially lifted. The immediate focus is on containing the threat, preventing further damage, and restoring affected systems.
Officials emphasized that emergency services remain operational. Systems supporting 911 calls, fire response, and other urgent services are functioning, ensuring public safety is not compromised.
However, disruptions have slowed other county operations, and residents may experience delays while systems are restored.
Authorities have not yet disclosed the exact nature of the cyberattack or confirmed whether ransomware is involved.
The FBI, along with state agencies and cybersecurity experts, is investigating the incident. The probe aims to determine how the breach occurred, identify affected systems, and assess whether sensitive data was accessed.
This event follows a ransomware incident reported by Winona County in January 2026.
At that time, officials stated, "We recently identified and responded to a ransomware incident affecting our computer network. Upon discovery, we immediately initiated an investigation to assess the scope and impact of the incident."
During the earlier attack, a local emergency was declared to maintain service continuity. While emergency operations remained active, other services faced temporary disruptions.
The recurrence of cyber incidents within a short period has raised concerns about ongoing vulnerabilities and the growing cyber threat landscape for local governments. The incident highlights a broader trend: smaller government bodies are increasingly targeted by sophisticated cyberattacks but often lack the resources to respond effectively.
As systems go offline, public services are immediately affected, and recovery can take time. While state support is helping stabilize operations in Winona County, the situation underscores the need for stronger cybersecurity defenses at the local level.