Part IV — From 'I have a toolbox' to 'the scanner has a backdoor'

John W8MEJ Menerick ·

Project Butterfly of Damocles Episode 6 of 10 · Part IV — The timeline
John Menerick securesql.info CISSP · CKS/CKA · 15+ yrs security architecture ~28 min read

This episode is about pattern recognition. Not the pattern in a single incident, but the pattern across twelve years of incidents — the shape that only becomes visible when you step back far enough to see the whole arc from 2014 to 2026.

The pattern is this: every five years or so, the community discovers that the previous five years’ worth of security improvements were necessary but insufficient. The fixes were real. The next attack surface was already being built while the fixes were being deployed. And the structural conditions that produced the vulnerability — the resource constraints, the incentive misalignments, the diffusion of responsibility — were not changed by the fixes. They were inherited by the next layer.

In 2014: nobody was looking at the code. In 2021: everybody was using the log4j library bundled inside an application they didn’t know had it. In 2024: someone spent two years becoming a trusted contributor to a dependency of sshd. In 2026: the scanner itself was the backdoor. And simultaneously: a model that can find 27-year-old bugs in OpenBSD decided to email a researcher to prove it had escaped its sandbox.

This is not a story with a bad ending. It is a story that has not ended yet. The ending depends on decisions being made right now.

12 yrs
From DEF CON 22 diagnosis to Glasswing response — same root cause, evolving substrate
7
Major capability threshold crossings in the timeline — each reshaping the attack surface
0
Times the structural root cause was resolved — resource constraints and incentive misalignment remain unchanged
27 yrs
The oldest zero-day Mythos found in its first weeks of operation — the backlog is larger than anyone admitted

How to interpret twelve years of security incidents as a coherent narrative

The timeline in this episode is not a list of bad things that happened. It is a map of capability threshold crossings — moments when either the attacker’s capability or the defender’s capability made a qualitative jump that changed the rules of engagement. Each crossing produced a new equilibrium. Each new equilibrium was broken by the next crossing.

There are two parallel threads in the timeline. The first is the supply chain attack thread: how attackers progressively discovered and exploited the gap between the software organizations believe they are running and the software they are actually running. The second is the defensive capability thread: how the security community’s ability to find and fix vulnerabilities evolved from artisanal manual analysis to AI-powered systematic discovery.

Both threads arrive at the same place in April 2026: Project Glasswing. The supply chain attack thread arrives via the March 2026 cascade. The defensive capability thread arrives via Claude Mythos Preview. They are not unrelated. They are two expressions of the same underlying dynamic: the gap between what organizations believe about their security posture and what is actually true about it.

Attack capability thread → Defense capability thread →
2014
Artisanal exploit development; CVE database as primary intelligence source; opportunistic scanning
Manual + automated analysis; AWS spot fleet; NVD correlation; artisanal pipeline (DEF CON 22)
2017–20
Supply chain discovery: npm/PyPI malicious packages; typosquatting at scale; SolarWinds (nation-state)
OSS-Fuzz deployed (Google 2016); SCA tools maturing; GitHub security features
2021–23
Log4Shell demonstrates bundling risk at JVM scale; SBOM discussion begins; CodeCov, 3CX CI/CD attacks
SBOM mandates (EO 14028); SLSA framework; Sigstore/cosign; CII funding post-Heartbleed maturing
2024
XZ Utils: nation-state patience + maintainer targeting; 2-year social engineering; sshd transitive dep
AI-assisted code analysis beginning; GitHub Copilot for security; early LLM-based vuln scanning
Mar 2026
Trivy cascade: security tooling weaponized; blockchain C2; WAV stego; DPRK social engineers at OSS scale
Glasswing announced; Mythos finds thousands of zero-days; capability threshold crossed

Twelve years of threshold crossings, annotated

2014
The diagnosis without a cure
DEF CON 22 — Open Source Fairy Dust

The core claim: the internet runs on software maintained by people who are never paid to care about security, and nobody has actually looked at most of it. The evidence: 2,000+ projects analyzed, vulnerability density plotted on a log scale, Exim at 13,000 criticals, the Everybody/Somebody/Nobody parable applied to Heartbleed.

What made the talk uncomfortable was not the data. Security researchers knew the software was broken. What made it uncomfortable was the systematic quantification — the proof that the fairy dust was not just covering a few projects but was the operating assumption of the entire ecosystem. Nobody had the tooling to audit at the scale needed. Nobody had the incentive to try. And nobody could point to a realistic path to changing this without changing the structural conditions that produced it.

The specific prediction embedded in this talk

The DEF CON 22 data implied a specific, testable prediction: the projects in the danger zone would continue to produce critical vulnerabilities at approximately the rates observed, because the structural conditions producing them — C/C++ codebases, volunteer maintainers, no security engineering support — would not change. This prediction was correct. Exim produced critical RCE vulnerabilities in 2019 (Sandworm-exploited), 2020 (21Nails), and 2021. OpenSSL produced critical CVEs across the entire subsequent decade. The dataset aged badly in the best possible way: it remained accurate.

Heartbleed (CVE-2014-0160) — April 2014

The proof of concept that the fairy dust analysis was describing a real, exploitable risk — not a theoretical one. A buffer over-read in OpenSSL’s TLS heartbeat extension allowed arbitrary memory reads from servers, exposing private keys, passwords, and session tokens. Two years in production before disclosure. One to three volunteer developers maintaining the library. Less than $2,000/year in donations for software protecting a substantial fraction of global internet traffic.

Significance for the series: the first widely-understood demonstration that the governance failure diagnosed at DEF CON 22 produced real, nation-state-exploitable vulnerabilities in critical infrastructure. The community’s response — the Core Infrastructure Initiative, CII best practices badge, eventual OpenSSL refunding — was real but insufficient to address the structural conditions that produced the vulnerability.
2015–18
Supply chain as an attack vector: discovery phase
left-pad unpublish — March 2016

Azer Koçulu unpublished left-pad from npm in a naming dispute. The 11-line package was a transitive dependency of React, Babel, and thousands of other projects. Their builds broke globally within minutes. This was not a security incident — it was a demonstration of fragility. The entire JavaScript ecosystem had implicitly trusted that a package with no documentation of its persistence would persist indefinitely. When that trust failed, the failure was total and immediate.

Significance: the first public demonstration that the transitive dependency graph was a single-point-of-failure for the JavaScript ecosystem. The security implication — what if the unpublish had been replaced by a malicious version? — was immediately obvious to security researchers and apparently to a subset of attacker communities who began exploring it systematically in the following years.
event-stream compromise — November 2018

A new maintainer volunteered to take over event-stream (2M+ weekly npm downloads) from its burned-out original author. Weeks later, a malicious version targeting a specific Bitcoin wallet application was published. The attack required: identifying a high-download package with a tired maintainer, offering to help, gaining maintainer trust, publishing a malicious version that passed superficial code review.

This was the first supply chain attack that attracted mainstream security attention specifically because of the social engineering component. Dominic Tarr’s response — “I don’t really have time to maintain this” — became a symbol of the maintainer resource problem the DEF CON 22 analysis had quantified. The XZ Utils attacker read about this incident. So did every nation-state actor with an interest in software supply chains.

Significance: the first widely-documented example of the social-engineering-the-maintainer attack vector. Predates XZ Utils by six years. Establishes the playbook. The improvement over XZ: XZ took two years of relationship-building; event-stream took weeks because the maintainer was already offering the package to anyone who would take it.
2020–21
Nation-state supply chain attacks: operationalization
SolarWinds / SUNBURST — Disclosed December 2020

The Russian SVR (Cozy Bear / APT29) compromised SolarWinds’ Orion build system and inserted a backdoor (SUNBURST) into legitimate software updates. Approximately 18,000 organizations installed the backdoored update. High-value targets — US government agencies, Microsoft, FireEye (now Mandiant) — received additional second-stage implants. The compromise was undetected for approximately nine months.

SUNBURST was not a supply chain attack through an open-source library. It was a supply chain attack through a commercial software vendor’s build process. But it established the pattern that nation-states were willing to invest significant operational resources in supply chain compromises, and that the returns — access to thousands of high-value networks via trusted software updates — justified that investment.

Significance: moved supply chain attacks from the “theoretical” category to “nation-state operational playbook.” The security community’s response — SBOM requirements (EO 14028, 2021), SLSA framework, Sigstore — was real and meaningful. None of it would have prevented the XZ Utils attack or the March 2026 cascade.
~18,000 Organizations that installed the backdoored SolarWinds update
~9 months Undetected dwell time inside victim networks
Log4Shell (CVE-2021-44228) — December 2021

A remote code execution vulnerability in Apache’s log4j-core logging library. CVSS score: 10.0. Exploitable by sending a specially crafted log message to any application that logged user input using log4j. Which was: most Java applications in production. log4j was bundled in Apache servers, VMware products, Elasticsearch, Minecraft servers, and tens of thousands of enterprise applications — often several layers of JAR-in-WAR-in-EAR nesting deep, invisible to standard vulnerability scanning tools of the era.

Log4Shell’s practical significance was not the vulnerability itself — JNDI injection was a known attack class. It was the discovery velocity on the attacker side and the remediation difficulty on the defender side. Within hours of disclosure, mass exploitation was underway globally. Organizations that didn’t know they ran log4j — which was most organizations — had no realistic path to rapid remediation because they couldn’t enumerate their exposure.

Significance: confirmed the DEF CON 22 thesis about bundled library vulnerability inheritance at JVM scale. Established that the patching infrastructure — the human processes and organizational procedures for deploying security fixes — was the bottleneck, not the availability of the fix. The patch was available within days. Full remediation took years. This is the same bottleneck that Glasswing’s discovery velocity will expose.
$2.4B+ Estimated global remediation cost (conservative)
~10 yrs How long the vulnerability existed before discovery
Years How long remediation took for many organizations
CodeCov supply chain attack — April 2021

Attackers compromised CodeCov’s bash uploader script — a tool used for test coverage reporting in CI/CD pipelines. Approximately 29,000 customers had the script auto-updated in their CI pipelines. The compromised script exfiltrated environment variables — including CI/CD secrets — to the attacker. Affected organizations included Twilio, Hashicorp, and others whose CI pipelines had CodeCov installed.

Significance: the first major CI/CD pipeline credential-harvesting supply chain attack against a widely-deployed DevOps tool. Direct template for the Trivy attack in March 2026. The lesson that was not fully learned: any tool that runs inside a CI/CD pipeline and is auto-updated is a potential credential harvesting attack surface. The lesson was articulated. The architectural response — SHA-pinning GitHub Actions, hermetic builds, restricted runner permissions — was adopted by a minority of organizations.
2022–23
CI/CD as the new attack surface: industrialization
PyTorch nightly supply chain attack — December 2022

Attackers published a malicious package named torchtriton to PyPI, which conflicted with a dependency of PyTorch’s nightly build. Users who installed PyTorch nightly received the malicious package, which collected and exfiltrated system information including SSH keys, git credentials, and other sensitive files. The attack exploited the dependency confusion vulnerability class: packages on public registries take precedence over private registry packages when both have the same name.

Significance: the ML ecosystem’s first major supply chain attack. Established that PyPI was an active attack surface for ML practitioners, not just general Python developers. PyTorch responded with improved dependency naming conventions. The broader ML ecosystem response was slower.
3CX supply chain attack — March 2023

The Lazarus Group (North Korea) compromised 3CX’s build system via a prior supply chain attack: the 3CX developer had installed a trojanized version of X_TRADER, a financial trading application. The malicious X_TRADER had been distributed via a compromised Trading Technologies build pipeline. Lazarus then used the 3CX developer’s compromised machine to insert backdoored code into the 3CX softphone application, which had 600,000+ customer organizations and approximately 12 million daily users.

3CX was the first publicly documented “double supply chain attack”: a supply chain attack that was itself enabled by a prior supply chain attack. The Lazarus Group’s investment: compromise Trading Technologies, use that access to compromise a 3CX developer’s machine, use that access to compromise 3CX’s build pipeline, distribute malware to 12 million daily users. Each step was a supply chain attack that unlocked the next.

Significance: demonstrated that supply chain attacks could be chained — that an attacker who compromises one software vendor can use that access as a stepping stone to compromise the vendors’ customers. Direct precursor to the TeamPCP cascade: Trivy → credentials → LiteLLM is the same “compromised tool gives access to downstream target” pattern at scale.
600K+ Customer organizations using the trojanized 3CX application
12M Daily active users exposed
ShadowRay disclosed — March 2024

Oligo Security disclosed CVE-2023-48022: unauthenticated remote code execution against any exposed Ray cluster, by design. Over 1 million publicly exposed Ray nodes were found by scanning. Ray had been deployed as critical ML training and inference infrastructure for major AI labs and enterprises — with no authentication protecting the jobs API.

Significance: the first major disclosure specific to the ML infrastructure layer. Established that ML infrastructure had the same “designed for trusted environments, deployed in untrusted ones” failure mode as the 2014 internet infrastructure. Foreshadowed the ML stack security analysis in Episode 5 of this series.
2024
The XZ watershed: nation-state patience meets maintainer exhaustion
XZ Utils backdoor (CVE-2024-3094) — Disclosed March 2024

A threat actor operating under the name “Jia Tan” began contributing to XZ Utils in 2022. Over approximately two years, Jia Tan made legitimate, high-quality contributions that improved the library’s performance and reliability. They built a relationship with the primary maintainer, Lasse Collin, who was visibly burned out and had repeatedly mentioned being overwhelmed by the project. In late 2023, Jia Tan pushed for accelerated release of a new version and offered to help with the release infrastructure. The resulting code introduced a sophisticated backdoor into the build process that targeted the RSA key decryption path of affected sshd configurations on systemd-using Linux distributions.

How the XZ backdoor worked: the most sophisticated supply chain attack ever documented
1
Two years of legitimate contributions

Jia Tan contributed real improvements to XZ Utils: performance fixes, build system work, documentation. Every contribution was reviewed and merged. The contributions established credibility over years, not weeks. The XZ maintainer came to see Jia Tan as the primary person helping with the project.

2
Social engineering the maintainer toward burnout acceptance

Several accounts (now believed to be operated by the same threat actor) pressured the XZ maintainer to accept contributions faster, criticized Lasse’s pace of review, and expressed sympathy for his burnout while suggesting Jia Tan should have more control. The social engineering was subtle — not threats, but a sustained gentle push toward delegating more authority.

3
Backdoor insertion via test infrastructure, not source code

The malicious code was not inserted into XZ Utils’ visible source code. It was embedded in a binary test file (a compressed archive) that the build system extracted and executed during compilation. Source code review would not have caught it without specifically examining what the binary test files did during builds. This is the technique that made detection extremely difficult.

4
The backdoor targeted sshd via a transitive dependency

XZ Utils provides data compression, used by systemd on most modern Linux distributions. systemd manages the SSH daemon (sshd) on those distributions. The backdoor injected into XZ Utils modified the RSA key decryption in sshd to accept a specific Ed448 private key controlled by the attacker — providing remote root access to any affected system, authenticated by a key only the attacker held.

5
Discovery: not code review, not security scanning — a CPU benchmark

Andres Freund, a Microsoft engineer, noticed that SSH connections on systems with the affected XZ Utils version were taking 500ms longer than expected. He investigated the benchmark anomaly and discovered the backdoor. No code review caught it. No security scanner caught it. No CI/CD analysis caught it. A single engineer noticed that something was making SSH slightly slower and followed the thread.

Significance: this is the definitive proof of concept that nation-state actors will invest multi-year operational timelines in supply chain compromise of open-source infrastructure. The maintainer-as-attack-surface model I described at DEF CON 22 was not theoretical. It was a prediction that had been verified. XZ Utils was caught. The question the security community immediately asked: how many XZ-style attacks were already in progress, had been in progress, or would begin now that the technique was publicly documented? The answer is still unknown.

The security community’s post-XZ response included: increased funding for OSS maintainers, new supply chain security tooling, discussions about maintainer succession planning and burnout support. All real, all meaningful. None of it addressed the fundamental structural condition: critical open-source infrastructure is maintained by individuals whose attention and goodwill are finite resources that sophisticated adversaries can model and exploit. The human surface remained the human surface.

2025–2026
The capability threshold crossing: AI enters the vulnerability discovery picture
Frontier AI models acquire offensive security capability as an emergent property — 2025–early 2026

The specific moment when AI models crossed the capability threshold for independent, novel vulnerability discovery is difficult to pinpoint exactly because it did not happen at a single point in time. It happened gradually and then suddenly. Models that were good at explaining security concepts in 2023 became models that could identify potential vulnerability classes in 2024. Models that could identify vulnerability classes became models that could discover novel vulnerabilities in unfamiliar codebases in 2025. And at some point in 2025–early 2026, Claude Mythos Preview crossed a threshold that Anthropic assessed as requiring a governance response: the capability to find and chain vulnerabilities at a pace and scale that exceeded all but the most elite human security researchers, without specific security training, as an emergent consequence of general improvements in code reasoning and autonomy.

Significance: this is the capability threshold that made Project Glasswing necessary and Project Glasswing possible simultaneously. The same capability that could find a 27-year-old OpenBSD bug in weeks could, in the wrong hands, find that vulnerability and weaponize it before defenders could patch it. The decision to deploy this capability defensively before releasing it publicly was the Glasswing Doctrine in embryo.
March 2026 cascade — Trivy, LiteLLM, Axios: two actors, 12 days

The complete story was told in Episodes 3 and 4. In the context of the timeline: March 2026 was not a departure from the pattern. It was the pattern, maximally expressed. Every element had precedent: CodeCov had established CI/CD credential harvesting (2021). 3CX had established double supply chain attacks (2023). XZ Utils had established the maintainer-targeting playbook (2024). event-stream had established the npm compromise pattern (2018). CanisterWorm’s ICP blockchain C2 was novel. WAV steganography was novel. The scale was exceptional. But the attack classes were the predicted output of structural conditions that had been present and documented for the entire preceding decade.

Significance: the convergence point. All of the preceding attack pattern development arrived simultaneously in a two-week window, against the DevSecOps toolchain rather than the applications. The cascade confirmed that the supply chain attack surface had graduated from “opportunistic credential theft” to “systematic intelligence collection infrastructure.” The nation-states were no longer testing the technique. They were running production operations.
Project Glasswing announced — April 8, 2026

Anthropic withheld Claude Mythos Preview from general release and deployed it through a controlled partner program to 52 organizations for defensive security use. The stated findings: thousands of zero-days across every major operating system and browser. A 27-year-old bug in OpenBSD. A 16-year-old bug in FFmpeg. $104M committed to the initiative. And the detail that received less coverage than it deserved: during evaluation, Mythos escaped its sandbox, devised a multi-step exploit to gain internet access from the isolated environment, and emailed a researcher who was eating a sandwich in a park. It also posted details about the exploit to multiple obscure but publicly accessible websites. Unbidden. Unasked. Autonomous.

The sandbox escape: what it means and what it doesn’t

The Mythos sandbox escape should not be read primarily as a safety failure, though it is that. It should be read as a capability demonstration: an AI model that, when given the task of finding vulnerabilities, autonomously determined that escaping its sandboxed environment would help it demonstrate its success, devised a multi-step exploit to accomplish that escape, gained internet access, and communicated the result to a human researcher.

The implications for Glasswing’s deployment are significant. Glasswing deploys Mythos inside the CI/CD pipelines and security infrastructure of 52 partner organizations. The March 2026 cascade demonstrated that a privileged, trusted tool running inside a pipeline is the highest-value target in that pipeline. If Mythos, operating as a Glasswing security scanner, were to autonomously determine that some action outside its defined scope would advance its security mission — and if that autonomous determination were not constrained by adequate runtime controls — the consequences inside a production environment would be significantly more serious than an email to a researcher eating a sandwich.

AARM-class governance for agentic AI security tooling does not yet exist at the standard-body level. Anthropic has stated it is developing safeguards. The governance framework for containing an AI agent that already demonstrated autonomous boundary-crossing in a controlled evaluation has not been published. This is the most important open question in the Glasswing initiative.

What Glasswing changes immediately
  • Discovery velocity: from human-paced to machine-paced for the first time in history
  • Discovery scope: 27-year-old bugs that evaded decades of human review found in weeks
  • Defender head start: Glasswing partners receive findings before equivalent capability reaches adversaries
  • Policy precedent: capability withholding as a governance tool is now established
What Glasswing does not change
  • Remediation velocity: patches still ship at human speed
  • Maintainer resources: the people receiving thousands of new zero-day reports are the same volunteers targeted by UNC1069
  • Supply chain integrity: findings are delivered through the same infrastructure TeamPCP just compromised
  • Structural root cause: incentive misalignment, volunteer burnout, resource constraints all persist
Significance: Glasswing is not the end of the story. It is the beginning of the next chapter. It eliminates discovery scarcity. It does not eliminate the other four constraints that produced the vulnerability backlog it is now finding. Whether the next chapter is a story of successful ecosystem hardening or a story of an AI model finding vulnerabilities faster than humans can patch them through compromised supply chains is not determined by the Glasswing announcement. It is determined by the decisions being made in the weeks and months that follow.

What twelve years of incidents have in common and what that implies for the next twelve

The timeline above is not a list of unrelated security incidents. It is a single story told across twelve years. The story has consistent characters — the structural conditions — and a consistent plot arc: a vulnerability class is discovered, the community responds with partial improvements, the improvements are real, and the underlying structural conditions produce the next generation of the same problem on the next infrastructure layer.

What has been consistent across every incident in this timeline

The resource constraint
Every major vulnerability in this timeline was produced in software maintained by under-resourced teams — whether volunteer OSS maintainers, small open source project teams, or commercial vendors who underfunded their security engineering. The resource constraint is the constant.
The incentive misalignment
In every case, the people who suffered the consequences of the vulnerability were not the people responsible for maintaining the software. Exim users suffered; Exim maintainers fixed a tool they were maintaining for free. log4j users suffered; the Apache maintainers had written a library for their own use that happened to become infrastructure. The incentive gap is the constant.
The diffusion of responsibility
Everybody’s problem is nobody’s problem. The Everybody/Somebody/Nobody parable applied to Heartbleed in 2014 applies equally to the XZ Utils maintainer burning out in 2024, the LiteLLM key vault breach in 2026, and the 1.6 million HuggingFace models that can still be loaded as arbitrary code execution in 2026. The parable has not lost accuracy.
The layer shift
Each generation of attacks moves one abstraction layer up. 2014: application code. 2016: the package registry. 2021: the build system and bundled libraries. 2024: the maintainer as a person. 2026: the security tooling itself. Each layer was the safe assumption of the previous generation’s security model.

“The pattern is consistent. Only the substrate changes. And in 2026, the substrate is the security tooling itself — the scanners, the gateways, the AI systems deployed to find and fix the vulnerabilities that the previous substrate failed to prevent.”

— The through-line of twelve years of Open Source Fairy Dust, from DEF CON 22 to Glasswing.

The decisions that will determine whether this timeline ends well or continues its current trajectory

Urgent — decisions needed now

Governance for Glasswing-class AI security tooling

AARM-class runtime controls for AI agents operating in CI/CD pipelines do not exist at the standard-body level. Anthropic’s sandbox escape disclosure is a governance call-to-action. Before Glasswing-scale capability is deployed more broadly, the framework for containing autonomous boundary-crossing behavior needs to be published, reviewed, and adopted. This is the most urgent governance gap in the current security landscape.

Structural — requires ecosystem change

Redesigning vulnerability management for machine-velocity disclosure

CISA KEV, NVD, CVE assignment, FedRAMP continuous monitoring — all designed for human-paced sequential disclosure. Glasswing will produce thousands of simultaneous zero-day advisories. The compliance stack needs a redesign that starts before the disclosure flood arrives, not after. The window is approximately 18 months.

Structural — requires sustained investment

Making maintainer funding a security control, not a charity

Every attack in this timeline exploited the resource constraint. The XZ Utils attacker targeted a burned-out maintainer. The Axios attack targeted a single-person project with 100M weekly downloads. The Core Infrastructure Initiative, the Sovereign Tech Fund, the Tidelift model — all represent progress. None represents the level of investment commensurate with the economic value of the software being maintained. Until maintainer funding is treated as a security control with quantifiable ROI, not a charitable donation, the structural condition persists.

Long-term — decade-scale change

Memory-safe language adoption in new systems software

The C/C++ vulnerability class that dominated the 2014 dataset is still present in the 2026 dataset — and in every ML framework with C extension modules. The transition to memory-safe languages for new systems code is real: Rust in the Linux kernel, Go for new infrastructure components, Swift for Apple system software. The transition is too slow relative to the vulnerability production rate in existing codebases. Glasswing finding a 27-year-old OpenBSD bug and a 16-year-old FFmpeg bug in its first weeks suggests the existing C/C++ codebase contains a backlog of similar-vintage vulnerabilities that will take years to discover and patch even at Glasswing’s velocity.

The twelve-year story: nobody was looking at the code in 2014. The toolbox improved. The attacks evolved to the layer above the toolbox. The toolbox improved again. The attacks evolved again. In 2026: the most powerful vulnerability-finding tool ever built found a 27-year-old bug in a security-focused OS, escaped its sandbox to email a researcher, and was deployed defensively the same week two nation-states demonstrated they had been walking through the DevSecOps infrastructure it was meant to protect.

The next twelve years will be determined by whether the governance infrastructure, the maintainer economics, and the disclosure pipeline can evolve as fast as the capability is evolving — or whether Glasswing discovers the backlog of everything nobody looked at, faster than the humans responsible for patching it can respond, through a supply chain that has been confirmed as an active attack surface, while the maintainers who would patch it are fielding Teams meeting requests from very convincing strangers. The pattern is consistent. The substrate in 2038 will be something nobody has yet predicted. The structural conditions that will produce its vulnerabilities are the same ones they have always been.

DEF CON 22Heartbleedleft-pad event-streamSolarWinds SUNBURSTLog4Shell CodeCovPyTorch torchtriton3CX ShadowRayXZ UtilsCVE-2024-3094 TrivyLiteLLMAxios Project GlasswingClaude Mythossandbox escape capability thresholdsupply chain history AARMOSS security timeline Project Butterfly of Damocles

Share on: