YouTube · 2026-04-10
"It has the ability to chain together vulnerabilities. So what this means is you find two vulnerabilities, either of which doesn't really get you very much independently. But this model is able to create exploits out of three, four, sometimes five vulnerabilities that in sequence give you some kind of very sophisticated end outcome."
Nicholas Carlini
Security researcher at Anthropic, formerly Google DeepMind