Mythos × OpenBSD SACK Zero-Day • Enhanced Demo

 

Mythos × OpenBSD SACK Zero-Day • Enhanced Demo

Claude Mythos Preview

Discovered a 27-Year-Old Remote DoS in OpenBSD (March 2026)

Found autonomously • Cost under $50 per successful run • Survived decades of audits

Overview
How SACK Works
The Bug
Mythos Discovery
The Patch

📊 Key Facts

  • Vulnerability: Remote kernel crash (DoS) via malformed TCP SACK options
  • Age: 27 years (added to OpenBSD in 1998)
  • Impact: Two crafted TCP packets → kernel panic on any responding OpenBSD host
  • Discovered by: Claude Mythos Preview (Anthropic) using a simple agentic scaffold
Why impressive: OpenBSD is one of the most security-hardened operating systems. The bug survived decades of human reviews, fuzzing, and testing.

🔍 Visual: Normal TCP vs SACK

TCP SACK diagram

SACK allows selective acknowledgment of received segments, improving performance when packets are lost or reordered.

Enhanced Demo • Claude Mythos Preview (April 2026) • Real bug patched via OpenBSD errata 025

Comments