And yet Mythos couldn’t find it. Whomp whomp
Mythos might bed good at finding holes in an actual defined security boundary. But trying to audit Claude Code would be like trying to find the holes in Swiss cheese. Of course they’re there!
Maybe if they'd submitted each file twice instead of only once /s
Mythos might bed good at finding holes in an actual defined security boundary. But trying to audit Claude Code would be like trying to find the holes in Swiss cheese. Of course they’re there!
Maybe if they'd submitted each file twice instead of only once /s