If your dependency scanner waits for CVE advisories, it's already weeks late, and agents have closed that gap for the attacker. Since the start of 2026, we've been monitoring public commits across 100k+ JavaScript repositories and feeding security-patching commits to a blind Sonnet 4.6 agent with nothing but the diff. For 97 security fixes, within minutes, a working exploit POC fell out: no CVE id, no advisory text, no human in the loop. Turning a public fix commit into a working exploit used to cost skilled humans hours to days per bug, even in the easy cases. Not anymore.
Per-ecosystem medians vary by 80x. Even in npm, the fastest ecosystem, an attacker has a full week with the diff before the advisory drops.
Days between fix commit and advisory · log scale
Coordinated disclosure assumes the fix commit is a harmless implementation detail and the advisory is the signal attackers follow. That assumption held when reading a diff and turning it into a working exploit took a skilled human hours to days per bug in high-level programming languages, plus the unquantifiable cost of sifting through thousands of commits to find a vulnerability in a call path worth weaponizing. It does not hold any more.
Critical-severity CVEs sit at a 30-day median gap, twice as long as high severity (15 days). Whether the cause is embargo, backports, or retroactive CVE assignment, attackers get a full month with the most dangerous bugs before most scanners flag them.
If your SCA tool relies on NVD, GitHub Advisory, or OSV feeds, it alerts you when the advisory publishes. Overall, the fix commit for that CVE was pushed to GitHub 11 days earlier. The advisory isn't needed to identify, understand, or patch the vulnerability. The commit is sufficient.
For 97 security fixes, within minutes, a working exploit POC fell out: no CVE id, no advisory text, no human in the loop. The fix commit itself is now a reliable exploit primitive.
Since the start of 2026, we've been monitoring public commits across 100k+
JavaScript repositories and feeding security-patching commits to a blind Sonnet 4.6
agent armed only with a bash tool and the parent-to-fix diff. No
CVE id, no advisory text, nothing a human analyst would normally read first.
For companies that aren't part of Anthropic's private Mythos review, Seal is providing implementation support alongside full access to the Seal platform — for the 50 companies that join the Mythos Readiness Program. Apply security fixes weeks earlier than the advisory. No upgrade required. No supply-chain risk. No vendor lock.
Limited to 50 companies. We'll reach out with next steps after review.