
Google opened CodeMender — its autonomous code security agent — to external developers this week at I/O 2026. Powered by Gemini Deep Think, CodeMender scans codebases for vulnerabilities, writes patches, validates them against regressions, and surfaces a PR for human review. In six months of internal testing, it upstreamed 72 verified security fixes across open-source projects, some with codebases exceeding 4.5 million lines of code. Anthropic’s Mythos has already found 10,000+ zero-days and is deliberately kept behind a controlled program. Now Google is pushing its patching layer into the open — slowly, but it’s moving.
What CodeMender Actually Does
Most security tools produce reports. CodeMender produces merged PRs. That is the actual difference worth understanding.
The agent runs a full autonomous loop: it ingests a codebase and applies static analysis, dynamic analysis, fuzzing, SMT solvers, and differential testing to identify root causes — not symptom-level pattern matches. When it finds a vulnerability, Gemini Deep Think generates a fix. A dedicated critique sub-agent then reviews the code diff to catch regressions before a human ever sees it. Once validation passes, CodeMender prepares a pull request with the issue description, patch rationale, and test artifacts attached.
No patch goes anywhere without a human approving it. Google has been deliberate about this: “everything with your approval” is the explicit framing. The agent handles root cause analysis, patch generation, and automated regression checking — work that typically consumes a security engineer’s entire day.
CodeMender also works proactively. Beyond patching known CVEs, it applies compiler-level hardening to eliminate entire classes of vulnerabilities. That is a meaningful capability difference from a SAST scanner that flags issues and hands them back to you unchanged.
72 Patches in Six Months — Why That Number Matters
Google’s claim is falsifiable: 72 security fixes have been upstreamed to open-source projects with public commit histories. Some of those repos reached 4.5 million lines of code — the scale where a human security review takes weeks, not hours.
These are not dashboard alerts. Maintainers reviewed the patches, accepted them, and merged them. That is a concrete bar that most AI security tools never clear.
The counterpoint is worth holding: 72 patches over six months is a strong start, not proof of production-readiness at enterprise scale. CodeMender has operated in a controlled research environment. How it performs across thousands of unfamiliar codebases simultaneously remains an open question.
CodeMender vs Anthropic Mythos: Two Very Different Strategies
The AI security race has two major players right now, and their strategies are almost mirror images of each other.
Anthropic’s Mythos was announced in April 2026 and immediately withheld from public access. The model is too capable — Anthropic’s own position is that releasing it broadly creates dual-use risk that isn’t acceptable yet. Instead, it runs through Project Glasswing, a controlled program with partners including Amazon, Apple, Cisco, CrowdStrike, Microsoft, and NVIDIA. In its first month, Glasswing used Mythos to autonomously find over 10,000 high- and critical-severity zero-day vulnerabilities across major operating systems and browsers — including a 17-year-old FreeBSD RCE that would give an attacker root access over NFS.
Google’s approach is different. CodeMender is oriented toward remediation rather than discovery. It is not designed to find novel zero-days — it is designed to fix vulnerabilities once they are known, faster and more reliably than a human team under pressure. And Google is opening access carefully: invite-only API for security researchers and OSS maintainers is live, with enterprise availability through Agent Platform arriving next.
The irony: Google is listed as a Project Glasswing partner. Both companies are collaborating on the defensive side while building competing commercial security agents. That tension will intensify.
Access and What Comes Next
Security researchers and OSS maintainers can reach CodeMender access through Google’s outreach — no public sign-up exists yet. Enterprise teams on Gemini Enterprise are in limited testing now. Broader access through Agent Platform is “coming soon,” which in Google’s product vocabulary means months, not weeks.
The more important question is not when you can access it — it is whether your team is ready for it. Autonomous patching requires governance infrastructure that most engineering teams have not built: identity controls, audit trails, policy gates, and integration with existing SAST/DAST pipelines. As analysts have noted, enterprises will not trust autonomous remediation as a standalone point solution — it must sit inside governed infrastructure with clear approval workflows.
Google built for this. CodeMender is being integrated into Agent Platform alongside identity, gateway, and observability components rather than shipped as a standalone tool. The architecture enforces governance even if most teams are not ready to use it that way yet.
Every major AI lab is now building a security layer. The question is not whether autonomous vulnerability patching becomes standard practice — it is which implementation earns enough trust to land in your pipeline. The category is real, the competition is serious, and the governance gap is the only thing slowing adoption down.













