{"id":40403,"date":"2026-05-15T19:15:29","date_gmt":"2026-05-15T19:15:29","guid":{"rendered":"https:\/\/www.europesays.com\/ai\/40403\/"},"modified":"2026-05-15T19:15:29","modified_gmt":"2026-05-15T19:15:29","slug":"microsoft-debuts-bug-hunting-100-agent-ai-system","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ai\/40403\/","title":{"rendered":"Microsoft Debuts Bug Hunting 100-Agent AI System"},"content":{"rendered":"<p>                    Computing Giant Touts Multi-Agentic &#8216;MDASH&#8217; Approach as Superior to Single Models<\/p>\n<p>                                                <a class=\"author-link\" href=\"https:\/\/www.govinfosecurity.com\/authors\/david-perera-i-5119\" rel=\"nofollow noopener\" target=\"_blank\">David Perera<\/a> (<a href=\"https:\/\/www.twitter.com\/@daveperera\" rel=\"nofollow noopener\" target=\"_blank\">@daveperera<\/a>)                                            ,<br \/>\n                                                        <a class=\"author-link\" href=\"https:\/\/www.govinfosecurity.com\/authors\/greg-sirico-i-7198\" rel=\"nofollow noopener\" target=\"_blank\">Greg Sirico<\/a>                                                     \u2022<br \/>\n                        May 15, 2026 \u00a0 \u00a0 <a href=\"https:\/\/www.bankinfosecurity.com\/microsoft-debuts-bug-hunting-100-agent-ai-system-a-31703#disqus_thread\" rel=\"nofollow noopener\" target=\"_blank\"><\/p>\n<p>                <img decoding=\"async\" src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/05\/microsoft-debuts-bug-hunting-100-agent-ai-system-image_large-9-a-31703.jpg\" alt=\"Microsoft Debuts Bug Hunting 100-Agent AI System\" class=\"img-responsive \"\/><br \/>\n                Image: Samuel Boivin\/Shutterstock            <\/p>\n<p>Microsoft says its new approach to finding vulnerabilities with artificial intelligence outclasses the single models touted by Anthropic and OpenAI.<\/p>\n<p>See Also: <a href=\"https:\/\/www.govinfosecurity.com\/ai-impersonation-new-arms-race-is-your-workforce-ready-a-31117?rf=RAM_SeeAlso\" rel=\"nofollow noopener\" target=\"_blank\">AI Impersonation Is the New Arms Race-Is Your Workforce Ready?<\/a><\/p>\n<p>The computing giant in a Tuesday <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2026\/05\/12\/defense-at-ai-speed-microsofts-new-multi-model-agentic-security-system-tops-leading-industry-benchmark\/\" target=\"_blank\" rel=\"nofollow noopener\">blog post<\/a> said it orchestrated more than 100 specialized AI agents &#8220;across an ensemble of frontier and distilled models&#8221; to discover 16 new vulnerabilities in the Windows networking and authentication stack. <\/p>\n<p>The company refers to the &#8220;multi-model agentic scanning harness&#8221; system as MDASH.<\/p>\n<p>&#8220;The strategic implication is clear: AI vulnerability discovery has crossed from research curiosity into production-grade defense at enterprise scale, and the durable advantage lies in the agentic system around the model rather than any single model itself,&#8221; wrote Taesoo Kim, vice president of security research at Microsoft.<\/p>\n<p>Of the 16 vulnerabilities found, four are &#8220;critical remote code execution flaws in components such as the Windows kernel TCP\/IP stack&#8221; and the IKEv2 key management protocol, the company reported. Microsoft patched the flaws as part of its most recent monthly dump of software fixes. AI is accelerating &#8220;the scale and speed of vulnerability discovery,&#8221; <a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\/blog\/2026\/05\/a-note-on-patch-tuesday\" target=\"_blank\" rel=\"nofollow noopener\">wrote<\/a> Tom Gallagher, who leads Microsoft&#8217;s Microsoft Security Response Center, in a note accompanying May&#8217;s Patch Tuesday publication.<\/p>\n<p>Microsoft&#8217;s agentic approach contrasts with Anthropic and OpenAI, which have touted the bug-finding properties of their individual Mythos and GPT 5.5 models, respectively. MDASH scored an 88.4% success rate on the University of California-Berkeley developed CyberGym <a href=\"https:\/\/www.cybergym.io\/\" target=\"_blank\" rel=\"nofollow noopener\">benchmark<\/a>, a method for testing AI abilities on actual vulnerabilities from production software. Mythos currently scores 83.1% and GPT 5.5 scores 81.8%. The scores are based on self-reporting from companies.<\/p>\n<p>Microsoft didn&#8217;t disclose what models it used nor who made them. It famously has had a close relationship with OpenAI, integrated GPT models across its products. But that relationship has <a href=\"https:\/\/www.govinfosecurity.com\/openai-trades-azure-exclusivity-for-enterprise-reach-a-31537\" target=\"_blank\" rel=\"nofollow noopener\">frayed<\/a> and Microsoft has pressed development of its own proprietary models, <a href=\"https:\/\/microsoft.ai\/news\/today-were-announcing-3-new-world-class-mai-models-available-in-foundry\/\" target=\"_blank\" rel=\"nofollow noopener\">announcing<\/a> in April three new &#8220;MAI&#8221; models, MAI-Transcribe-1, MAI-Voice-1 and MAI-Image-2.<\/p>\n<p>Kim touted the agentic approach as superior since &#8220;no single model is best at every stage.&#8221; The agents fulfilled different roles such as &#8220;auditor,&#8221; &#8220;debater&#8221; and &#8220;prover.&#8221;<\/p>\n<p>&#8220;We don\u2019t expect one prompt to do everything; we don\u2019t expect one agent to recognize, validate and exploit a bug in a single pass,&#8221; he said. Disagreement between underlying models itself can act as a signal, he wrote. &#8220;When an auditor flags something as suspect and the debater can\u2019t refute it, that finding\u2019s posterior credibility goes up,&#8221; he said.<\/p>\n<p>MDASH is only being utilized internally by Microsoft engineers and tested by a &#8220;small set of customers as part of a limited private preview.&#8221;<\/p>\n<p>Microsoft mentioned no plans of an upcoming public release, positioning MDASH as a research and &#8220;production-grade defense at enterprise scale.&#8221;<\/p>\n<p>            <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"Computing Giant Touts Multi-Agentic &#8216;MDASH&#8217; Approach as Superior to Single Models David Perera (@daveperera) , Greg Sirico \u2022&hellip;\n","protected":false},"author":2,"featured_media":40404,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[405,7537,7525,7519,1670,7522,1393,313,1557,7523,7526,7520,7515,7521,4770,7507,3165,7516,7514,7508,7511,7513,7512,7510,7509,7524,7517,3805,4036,2112,7518,4862],"class_list":{"0":"post-40403","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-agentic-ai","8":"tag-ai-agents","9":"tag-artificial-intelligence-agents","10":"tag-business-continuity","11":"tag-clinger-cohen-act","12":"tag-congress","13":"tag-coso","14":"tag-cyber-security","15":"tag-cybersecurity","16":"tag-defense-department","17":"tag-diacap","18":"tag-disaster-recovery","19":"tag-e-government-act","20":"tag-energy-department","21":"tag-fiscam","22":"tag-government-accountability-office","23":"tag-government-information-security","24":"tag-hipaa","25":"tag-homeland-security-department","26":"tag-identity-theft","27":"tag-information-security","28":"tag-information-security-articles","29":"tag-information-security-events","30":"tag-information-security-news","31":"tag-information-security-webinars","32":"tag-information-security-white-papers","33":"tag-legislation","34":"tag-national-security-agency","35":"tag-nist","36":"tag-office-of-management-and-budget","37":"tag-risk-management","38":"tag-us-cert","39":"tag-white-house"},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/40403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/comments?post=40403"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/40403\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media\/40404"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media?parent=40403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/categories?post=40403"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/tags?post=40403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}