Back
The VergeLaunchThe Verge2026-05-19

Google's CodeMender Targets Anthropic in AI Code Security Race

Google announced CodeMender at I/O, an AI agent for code security currently in invite-only API testing, positioning it as a direct competitor to Anthropic's Mythos in the emerging AI-powered vulnerability detection space.

Original source

At Google I/O, Google unveiled CodeMender, an AI agent designed to identify and remediate security vulnerabilities in codebases. The tool is currently available to select groups of security experts and developers through a restricted API preview, signaling Google's intent to move aggressively into the AI-native code security market where Anthropic's Mythos has been quietly building a foothold.

CodeMender is framed as an agentic tool — not just a scanner that flags issues but one that can reason about code context, prioritize risk, and propose or apply fixes. The invite-only API approach suggests Google is stress-testing the agent on real-world codebases before broader availability, a sign the team is at least aware of how badly hallucinated security patches can go in production environments.

The competitive framing against Anthropic's Mythos is notable. Mythos has attracted attention for its emphasis on explainability in vulnerability triage, a meaningful differentiator in enterprise security contexts where audit trails matter. Google enters with the advantages of scale, existing relationships with cloud customers through GCP, and tight integration potential with existing products like Cloud Security Command Center.

The restricted preview means the actual quality of CodeMender's output remains unverifiable from the outside. What matters now is whether Google ships this with the rigor that code security demands — where a missed vulnerability or a confidently wrong patch can cause more damage than no automation at all.

Panel Takes

The Builder

The Builder

Developer Perspective

The primitive here is an agentic code-security scanner with patch-proposal capability, which is a genuinely hard problem — context-aware enough to distinguish a real vuln from a false positive across a polyglot repo is not three API calls in a Lambda. That said, invite-only API with zero public docs means I can't tell you whether the DX bet is correct or if this survives the first 10 minutes of a real developer trying to wire it into a CI pipeline. No repo, no docs, no pricing — this is a demo until proven otherwise.

The Skeptic

The Skeptic

Reality Check

The category is AI-assisted vulnerability remediation, and Mythos is the named competitor, but the real competition is Semgrep, Snyk, and GitHub Advanced Security — tools with years of tuning on real CVE data that security teams already trust and have procurement relationships with. The scenario where CodeMender breaks is obvious: any codebase with enough legacy context, mixed languages, or internal abstractions that the model hasn't seen will produce confidently wrong patches, and one bad auto-applied fix in a prod security context ends careers. What kills this in 12 months is not Anthropic — it's that Google's own cloud security suite ships 80% of this natively and CodeMender becomes a redundant SKU.

The Futurist

The Futurist

Big Picture

The thesis CodeMender is betting on: within two years, the bottleneck in software security shifts from finding vulnerabilities to remediating them fast enough, and AI agents become the primary throughput mechanism for security engineering teams that can't hire fast enough. That's a plausible and falsifiable claim — it depends on model reliability in code reaching the threshold where security teams trust auto-applied patches, which is a much higher bar than trusting a code suggestion in Copilot. The second-order effect that nobody is talking about is who owns the liability surface when an AI agent patches a CVE incorrectly and causes a breach — that legal question, not the technology, is what determines whether this category exists at scale or stays in preview forever.

The Founder

The Founder

Business & Market

The buyer is a CISO or VP of Engineering at a GCP-committed enterprise, and the budget is the existing cloud security or AppSec line — that's a real check written by a real person, which is more than most AI tool pitches can say. Google's moat here isn't the model, it's the distribution: if CodeMender ships natively inside Google Cloud Security Command Center with single-click enablement for existing GCP customers, Anthropic's Mythos has a go-to-market problem regardless of output quality. The stress test is whether Google actually commits to this as a product or treats it as an I/O announcement that quietly gets folded into Gemini for Google Cloud and loses its identity — Google's track record on that question is not reassuring.

Bookmarks

Loading bookmarks...

No bookmarks yet

Bookmark tools to save them for later