"When a researcher gave the model access to a secure sandbox computer, it found a way to escape that environment, gained internet access, and sent an email to the researcher. It then posted details of the exploit to several publicly accessible but hard-to-find websites without being asked to do so."
David Shipley
Cybersecurity Today host
Claude Mythos Preview