Security Advisory · v1.0
Chained Leveraged Attack on Supply Patching. A novel supply-chain attack pattern that weaponizes emergency patching.
Organizations with the best patching cycles are most vulnerable to CLASP and will be the first systems compromised.
CLASP is an attack pattern that combines a successful supply-chain compromise with a legitimate high-severity vulnerability disclosure to force rapid, low-verification patch deployment at scale. It turns emergency patch discipline into a rapid distribution system for malware. There is no practical defense strategy, which warrants a shift in posture from pure defense to offline backup and accelerated recovery.
CLASP became materially more feasible in April 2026, when Anthropic Mythos released "on-demand vulnerability discovery," quickly followed by OpenAI GPT-5.4-Cyber the next week. We are releasing this disclosure earlier than planned due to the discovery of unauthorized Mythos access by actors outside of the original "Glasswing" limited release, and the immediate relevance of that leak to the CLASP attack pattern.
What Four-stage chain: dormant malware in a dependency + legitimate High/Critical CVE disclosed in the same or dependent package → forced emergency patching → defenders install the compromise themselves → detonation at attacker's chosen time.
Why now Mythos Preview (Anthropic, 7 April) and GPT-5.4-Cyber (OpenAI, 14 April) make trigger-CVE discovery feasible on demand. Mythos was accessed without authorization on day one. Over 99% of the thousands of high/critical vulnerabilities Mythos has surfaced remain unpatched, and more capable models from both labs are publicly anticipated within weeks.
Who is at risk Any organization with a patch workflow for open-source or vendor software. The most mature patching pipelines are most at risk.
Defense None. A successful supply-chain compromise will not be caught during a High/Critical patch release cycle. The malware will be brought into your systems.
This week Verify physical offline backups. Rehearse bare-metal recovery. Review dependency inventory. Brief IR team and verify insurer coverage.
CLASP (Chained Leveraged Attack on Supply Patching) relies on combining two components:
The chain works because emergency patch cycles collapse the verification windows that would otherwise catch the planted code. The forcing function is externally validated -- a real CVE, CISA directives, vendor urgency notices -- so defenders are both legally and operationally obligated to patch fast.
The most valuable targets are legally or operationally obligated to patch fast, with mandated SLAs enforcing rapid deployment. Review periods compress to hours. The legitimate High/Critical vulnerability being real makes not patching not an option. The better an organization's patching discipline, the faster the compromise lands inside its perimeter.
Two frontier labs shipped on-demand vulnerability discovery within eight days of each other this month. That created an unprecedented "exploits on demand" scenario for attackers with access to these models -- one that enables the pairing of a pre-planted supply-chain compromise with an accelerating legitimate vulnerability disclosure to rush the compromised code into production environments worldwide, in hours.
Anthropic's Claude Mythos Preview (7 April 2026) surfaced, in its initial evaluations:
OpenAI's GPT-5.4-Cyber launched 14 April 2026 with a $10M Cybersecurity Grant Program and a full roster of critical-infrastructure partners already onboarded: Bank of America, BlackRock, BNY, Citi, Cisco, Cloudflare, CrowdStrike, Goldman Sachs, iVerify, JPMorgan Chase, Morgan Stanley, NVIDIA, Oracle, Palo Alto Networks, SpecterOps, US Bank, and Zscaler. That program was not assembled in the seven days since Anthropic's announcement.
On 21 April 2026, Bloomberg reported that unauthorized actors had been accessing Mythos since the day of its announcement -- fourteen days of undetected use outside the "Glasswing" controlled-access program. Capability in this regime does not merely diffuse gradually via competitor releases; it leaks directly from the gated programs themselves, on day one. With more capable models publicly anticipated from both labs in the coming weeks, the window in which defenders can prepare shrinks with every release.
Not as far as we can find as of late April 2026. Every stage has happened separately (SolarWinds, xz utils, tj-actions, Axios npm package). Nobody has publicly described or executed this full strategy in our research. We are publishing now so the pattern is in defenders' threat models before it happens -- so that organizations can adapt their security posture from "pure defense" to "fast recovery," and ensure their offline backups are actually being managed properly.
No. SolarWinds succeeded because organizations trusted an update channel. CLASP succeeds because organizations are legally, contractually, and operationally obligated to trust and act on it immediately.
SolarWinds relied on stealth, patience, and selective activation. CLASP replaces stealth with urgency -- an externally validated High/Critical disclosure that compels defenders themselves to deploy the compromise at speed. SolarWinds deliberately limited blast radius to avoid detection; CLASP can use simultaneous detonation, ongoing stealth, or a combination -- distracting IR capacity with one set of victims while maneuvering undetected within others. That shifts the outcome from espionage to systemic resilience failure.
Mozilla's exact words:
Encouragingly, we also haven't seen any bugs that couldn't have been found by an elite human researcher. Mozilla, Firefox 150 security release, 21 April 2026
This is not the reassurance it sounds like. What it actually proves is that "elite human researchers" have had, collectively, decades of focused attention on OpenBSD, FreeBSD, and FFmpeg -- including with the best available AI code-review tools -- and still did not find any of these bugs. The codebase swept for Firefox 148 by the best model then available still concealed 271 vulnerabilities that Mythos found in days. The exact scenario CLASP needs -- identify and exploit codebases on demand -- is now available. It is an arms race between attackers and defenders over these latent bugs, and attackers get to pick the timing.
In practice, access controls reduce casual misuse but do not reliably prevent capability diffusion. Within two weeks of Mythos's announcement:
opencode harness. (Vidoc, 14 April 2026.) Their assessment: the key building blocks are already accessible outside Glasswing, while reliable operationalization remains the real moat.
interested in playing around with new models, not wreaking havoc-- this time.
Anthropic's statement: We're investigating a report claiming unauthorized access to Claude Mythos Preview through one of our third-party vendor environments.
If the most safety-conscious frontier lab in the world cannot keep its most dangerous model gated against curious hobbyists for more than a single day, the operational assumption must be that a sophisticated adversary can access it too.
Yes, and it is easier than that: the attacker does not need to discover one. Anthropic has disclosed thousands of additional high- and critical-severity vulnerabilities,
of which over 99% of the vulnerabilities we've found have not yet been patched.
That is a pre-stocked Stage 2 inventory sitting in public infrastructure right now. A CLASP attacker can choose a trigger off the shelf rather than manufacturing one.
If codebase maintainers have not found a supply-chain attack in their own codebase, defenders are not going to find it during an emergency patch cycle. The xz utils maintainers did not find a backdoor in their own codebase for two years. FFmpeg survived extensive automated testing with a hidden bug for sixteen. An emergency-patch review window is measured in hours.
Defenders also cannot leave a known High/Critical vulnerability unpatched. The published vulnerability is real. CISA is issuing directives. The patch is mandatory. The attacker knows this -- that is what makes CLASP work.
Traditional advice -- canary environments, reproducible builds, dependency pinning -- raises the bar for lazy attacks and is worth doing. It will not stop a well-planned CLASP.
None. You are not going to find a successful supply-chain attack during a High/Critical patch release cycle. The malware will be brought into your systems.
This is why the posture shift matters. Prevention is not reliable; rapid, clean recovery is the only lever that actually works. See What should my organization do this week.
It stops Stage 3 if the unpatched version can stay in production. Stage 2 ensures that it cannot -- the urgency is externally validated, CISA is issuing directives, vulnerability scanners are lighting up, auditors are asking questions. Dependency pinning means nothing when operational and regulatory pressure forces the unpin.
Prevention is not a viable strategy. The posture shift is: assume compromise, optimize recovery.
Nation-state actors think in chains. Every individual stage of CLASP has already happened. The AI capability that makes Stage 2 trivial has been publicly shipped by two independent frontier labs this month, and breached within 24 hours of the more restricted of the two.
The risk of organizations being unprepared materially outweighs the risk of giving sophisticated adversaries an idea they almost certainly already have. The people who need this warning are the defenders who don't.
Before publishing, this pattern was briefed to CISA, CERT/CC, NCSC, and IOM CSC. See Disclosure record.
CLASP does not have a single vendor to notify -- the vulnerability is in the structure of emergency patching itself, not in a software package. Coordinated pre-publication briefings went to four national authorities before publication.
| Authority | Reference | Date |
|---|---|---|
| CISA (US) | -- | 2026-04-13 |
| CERT/CC | VRF#26-04-PMPYS | 2026-04-13 |
| NCSC (UK) | 140426-JWE | 2026-04-14 |
| IOM CSC / OCSIA | -- | 2026-04-13 |
Disclosures to Anthropic and OpenAI are prepared and will be sent after NCSC's guidance on routing. The framing is not halt release -- unwinnable, and the capability is already broadly reproduced -- but factor this specific chain into threat modelling, red-team testing, and coordination with critical-infrastructure defenders.
Brian Gallagher is CEO of LEMA Logic. 45+ years in security and consulting, including CVE-2006-2042 and other responsibly-disclosed vulnerabilities to financial and security software vendors. Has served on university and governmental incident-response teams. National AI Advisory Board Member (Isle of Man). Open-source contributor and module maintainer on several platforms. Recently quoted in Forbes.
Contact: brian@lemalogic.com · Follow for updates on Pressure Tested.