I think they key thing here is they "isolated the relevant code"
If the exploits exist in e.g. one file, great. But many complex zerodays and exploits are chains of various bugs/behaviors in complex systems.
Important research but I don’t think it dispels anything about Mythos
Seems perfectly comparable to anthropic's method, they just wrapped the same kind of prompt in a for loop.
Did Mythos identify vulnerabilities across files? Afaik Mythos worked the same way, analysing a single file at a time.