Technology

From Smart Contracts to Infrastructure: How Anthropic's Mythos Is Forcing DeFi to Confront Its Deepest Vulnerabilities

Anthropic's Mythos AI — a new adversarial simulation model capable of chaining small weaknesses into multi-step exploits across interconnected systems — is shifting DeFi security attention away from smart contract auditing toward key management, bridges, oracle networks, and signing infrastructure, with Coinbase and Binance both reportedly approaching Anthropic to stress-test their systems.

Written By :
MINRK
MINRK
From Smart Contracts to Infrastructure

1. A New Kind of Security Threat

Mythos, the new AI model from Anthropic that has sparked fear and confusion in traditional tech and finance, is also driving a massive shift in how the crypto industry thinks about security. For years, decentralized finance has focused its defenses on smart contracts. Code is audited, vulnerabilities are cataloged, and many common exploits are well understood. But Mythos, a model designed to identify and chain together weaknesses across systems, is pushing attention beyond code and into the infrastructure that supports it. BitcoinEthereumNews.com

The shift Mythos is forcing is not merely incremental — it is architectural. The smart contract security industry that has grown up around DeFi is built on a known-vulnerability model: audit the code, catalog the bugs, fix what you find. Mythos operates on a different premise entirely. Rather than looking for known classes of problems in isolated code, it simulates an adversary exploring how a complex ecosystem of interconnected protocols, services, and infrastructure components can be compromised through the combination of individually minor weaknesses into a devastating exploit chain.

2. The Infrastructure Layer Is the New Target

"The bigger risks sit in infrastructure," said Paul Vijender, head of security at Gauntlet, a risk management firm. "When I think about AI-driven threats, I'm less concerned about smart contract exploits and more focused on AI-assisted attacks against the human and infrastructure layers." That includes key management systems, signing services, bridges, oracle networks, and the cryptographic layers that connect them. BitcoinEthereumNews.com

Vijender identified two specific areas where AI models like Mythos are especially valuable: first, multi-step exploit chains that historically only get discovered after money is lost; and second, early findings from models like Mythos have already identified weaknesses in the behind-the-scenes systems that keep crypto platforms secure, including the technology that protects keys and handles communication between systems. BitcoinEthereumNews.com

The Kelp DAO exploit — in which attackers poisoned RPC node software to feed false data to LayerZero's verification layer — is precisely the kind of infrastructure attack that Mythos is designed to surface proactively. That attack did not involve a smart contract vulnerability. It involved the compromise of the verification infrastructure that the smart contracts relied on to confirm the truth of external state. Mythos's ability to model adversarial paths through interconnected systems is designed to find those pathways before a $292 million loss makes them visible.

3. What Mythos Actually Does That Prior Tools Cannot

Anthropic's red team documentation describes Mythos Preview as capable of identifying and then exploiting zero-day vulnerabilities in every major operating system and every major web browser when directed to do so. The vulnerabilities it finds are often subtle or difficult to detect, with many being ten or twenty years old. In one case, Mythos Preview wrote a web browser exploit that chained together four vulnerabilities, writing a complex JIT heap spray that escaped both renderer and OS sandboxes. It autonomously obtained local privilege escalation exploits on Linux and other operating systems by exploiting subtle race conditions and kernel address space layout randomization bypasses.

Mythos Preview also identified a number of weaknesses in the world's most popular cryptography libraries, in algorithms and protocols including TLS, AES-GCM, and SSH — bugs that arise due to implementation oversights that allow an attacker to forge certificates or decrypt encrypted communications. The Block

Applied to crypto infrastructure — where RPC nodes, signing services, multi-party computation key shards, and oracle data feeds all rely on the same underlying cryptographic and network protocol libraries — the implication is that Mythos can find, and potentially chain, vulnerabilities that human auditors would never identify because the attack surfaces are too complex to reason about simultaneously without computational assistance.

4. The Industry Response: Coinbase, Binance, and JP Morgan Move First

Banks like JP Morgan are increasingly treating AI-driven cyber risk as systemic and are exploring tools like Mythos for stress testing. Earlier this month, Coinbase and Binance both reportedly approached Anthropic to test Mythos. BitcoinEthereumNews.com The engagement of the two largest crypto exchanges alongside one of the world's most systemically important banks in the space of weeks reflects how rapidly Mythos has elevated from a research artifact to an operational security tool that sophisticated institutions feel they must engage with regardless of readiness.

A related incident in the broader AI tooling ecosystem reinforced the urgency. A recent Vercel disclosure implicated a third-party AI tool, Context.ai, in the exposure of customer API keys — an illustration of how AI-native development tools introduce new supply chain attack surfaces even when the primary software itself is not directly compromised. The pattern of AI tools introducing new infrastructure vulnerabilities through their own integration points is precisely the kind of second-order risk that Mythos-class adversarial simulation is designed to surface.

5. DeFi Leaders: An Intensification of the Existing Environment

Aave founder Stani Kulechov described AI as reflecting the dynamics already at play in DeFi's adversarial environment. "Web3 is no stranger to well-funded and motivated adversaries," he told CoinDesk. "AI models represent an evolution in the tools used to achieve exploits." From that perspective, DeFi is already built for machine-speed attacks. Smart contracts execute automatically, and defenses such as liquidation mechanisms and risk parameters operate without human intervention. "DeFi operates at compute speed, so AI doesn't introduce a new dynamic. It intensifies an environment that has always required constant vigilance." Even so, Kulechov noted that Aave is seeing AI surface new categories of vulnerabilities, including issues that human auditors may have previously deprioritized.

6. Bitcoin's Cryptographic Foundation: Secure, But the Perimeter Is Not

The Bitcoin protocol itself remains cryptographically secure, according to Yan Pritzker, CTO at Swan Bitcoin — the underlying cryptography and consensus rules are not directly threatened by AI. But the more immediate risks are custodial services and exchanges. CoinDesk That distinction — between the security of the base protocol and the security of the human and software systems that sit around it — is the central insight Mythos is forcing the industry to internalize. Bitcoin cannot be compromised by Mythos. But the hardware security modules protecting custodial private keys, the API layers connecting exchange infrastructure to blockchains, the bridge verification networks relaying cross-chain messages, and the oracle systems feeding price data to DeFi smart contracts all can be, and that is where the exploits are.

7. Continuous Auditing as the New Baseline

Uniswap founder Hayden Adams said: "AI gives builders better ways to stress test and harden systems." Over time, Adams expects the gap between secure and insecure protocols to widen. "Projects that prioritize security will have greater ability to test and harden systems before launching. Projects that don't will be most at risk." That may be the real shift. Security is no longer about eliminating vulnerabilities. It is about continuously adapting to a system in which those vulnerabilities are constantly rediscovered and recombined.

The traditional audit model — engage an external firm for a point-in-time review before launch, publish the report, treat the protocol as audited — is structurally insufficient for the adversarial environment that Mythos represents. When an attacker can simulate multi-step exploit chains across interconnected infrastructure at AI speed, a protocol that was audited six months ago is functionally un-audited today if anything in its environment has changed. The new baseline security practice that Mythos is forcing toward is continuous, AI-driven adversarial simulation running in parallel with normal operations — a fundamentally different and significantly more resource-intensive security model that will, as Adams predicts, widen the gap between protocols that can afford it and those that cannot.

Related Articles

NEWSLETTERS

Don't miss another story.

Subscribe to the MINRK Newsletter today.

By signing up, you will receive emails about MINRK products and you agree to our terms of use and privacy policy.

Crypto Daybook Americas

Market analysis for crypto traders and investors.

EVERY WEEKDAY

Crypto for Advisors

Defining crypto, digital assets and the future of finance for financial advisors.

EVERY THURSDAY

The Protocol

Exploring the tech behind crypto one block at a time.

WEEKLY

Crypto Long & Short

A must read for institutions. Insights, news and analysis delivered weekly.

EVERY WEDNESDAY

CoinDesk Headlines

The biggest crypto news and ideas of the day.

EVERY WEEKDAY

State of Crypto

Examining the intersection of cryptocurrency and government.

WEEKLY

Research Reports

Join thousands of readers who rely on MINRK for data-driven insights on the latest digital asset trends.

MONTHLY