UK Government Maintains Open-Source Code Default While Addressing AI-Accelerated Vulnerability Risks
Key Takeaways
- ▸UK government affirms open-source code as the default for publicly-funded software, rejecting calls to close code in response to AI-accelerated vulnerability discovery
- ▸Claude Mythos Preview and other frontier AI models demonstrate materially stronger cyber capabilities, shortening discovery-to-exploit windows and requiring faster remediation
- ▸Operational capability—secure-by-design practices, automated dependency management, and rapid patching—is more important than code visibility in defending against AI-assisted attacks
Summary
The UK government has published guidance reaffirming its commitment to keeping publicly-funded source code open by default, even as AI-accelerated vulnerability discovery advances. The guidance, authored by RobinL with input from the UK AI Security Institute and government technology leaders, acknowledges that frontier AI models—including Anthropic's Claude Mythos Preview—demonstrate significantly improved capabilities for identifying security vulnerabilities. Rather than closing code by default, the guidance recommends maintaining openness while strengthening operational remediation capabilities. The core principle is that the primary driver of risk isn't code visibility, but the presence of unpatched vulnerabilities and slow remediation. The government emphasizes that teams should focus on secure-by-design practices, automated vulnerability management, and rapid response to security reports, rather than treating code visibility as a primary security control.
- Exceptions to the open-code policy must be explicitly justified through threat modeling, kept narrow and time-bound, and periodically re-approved


