Relevant if you build with AI tools, APIs, or coding agents. Relevant als je bouwt met AI-tools, API's of coding agents.
Introducing Trusted Access for Cyber Trusted Access voor Cyber geïntroduceerd
Our approach to enhancing baseline safeguards for all users while piloting trusted access for defensive acceleration. Onze aanpak om basisbeveiliging voor alle gebruikers te versterken, terwijl we trusted access testen voor defensieve versnelling.
Quick editorial signal Snelle redactionele duiding
- Track this as a OpenAI update, not just a standalone headline. Bekijk dit als OpenAI-update, niet alleen als losse headline.
- Useful for builders who need to understand API, coding, or workflow changes. Nuttig voor bouwers die API-, code- of workflowwijzigingen willen begrijpen.
- Likely worth revisiting after people have used the release in practice. Waarschijnlijk de moeite waard om opnieuw te bekijken zodra mensen het in praktijk gebruiken.
GPT‑5.3‑Codex is our most cyber-capable frontier reasoning model to date. Cybersecurity is one of the clearest places where that progress can both meaningfully strengthen the broader ecosystem and introduce new risks. We’ve moved from models that can auto-complete a few lines in a code editor, to models that can work autonomously for hours or even days to accomplish complex tasks. These capabilities can dramatically strengthen cyber defense by accelerating vulnerability discovery and remediation.
To unlock the full defensive potential of these capabilities while reducing the risk of misuse, we are piloting Trusted Access for Cyber: an identity and trust-based framework designed to help ensure enhanced cyber capabilities are being placed in the right hands. This reflects our broader approach to responsibly deploying highly capable models. In addition, we are committing $10 million in API credits to accelerate cyber defense.
Expanding access to frontier models for cyber defense
It is very important the world adopts frontier cyber capabilities quickly to make software more secure and continue to raise the bar of security best practices. Highly capable models can help organizations of all sizes strengthen their security posture, reduce response times, and improve resilience, while enabling security professionals to better detect, analyze, and defend against the most severe and targeted attacks. These advances have the potential to meaningfully raise the baseline of cyber defense across the ecosystem if they are put to work in the hands of people focused on protection and prevention.
There will soon be many cyber-capable models with broad availability from different providers, including open-weight models, and we believe it is critical that OpenAI’s models strengthen defensive capabilities from the outset. This is why we are launching a trust-based access pilot that prioritizes getting our most capable models and tools in the hands of defenders first.
It can be difficult to tell whether any particular cyber action is intended for defensive usage, or to cause harm. For example, “find vulnerabilities in my code” could be part of responsible patching and coordinated disclosure—or it could be used to identify software vulnerabilities to help exploit a system. Because of that ambiguity, restrictions intended to prevent harm have historically created friction for good-faith work. Our approach aims to reduce that friction while still preventing malicious activity.
Trust-based approach to frontier cyber capabilities
Frontier models like GPT‑5.3‑Codex have been designed with mitigations like training the model to refuse clearly malicious requests like stealing credentials. In addition to safety training, automated classifier-based monitors will detect potential signals of suspicious cyber activity. Developers and security professionals doing cybersecurity-related work may be impacted by these mitigations, while we calibrate our policies and classifiers.
To use models for potentially high-risk cybersecurity work:
To use models for potentially high-risk cybersecurity work:
* Users can verify their identity at chatgpt.com/cyber(opens in a new window)
Security researchers and teams who may need access to even more cyber capable or permissive models to accelerate legitimate defensive work can express interest in our invite-only program(opens in a new window). Users with trusted access must still abide by our Usage Policies and Terms of Use.
This approach is designed to reduce friction for defenders while preventing prohibited behavior, including data exfiltration, malware creation or deployment, and destructive or unauthorized testing. We expect to evolve our mitigation strategy and Trusted Access for Cyber over time based on what we learn from early participants.
Scaling the Cybersecurity Grant Program
To further accelerate the use of our frontier models for defensive cybersecurity work, we are committing $10 million in API credits for teams through our Cybersecurity Grant Program. We’re looking to partner with teams that have a proven track record of identifying and remediating vulnerabilities in open source software and critical infrastructure systems—teams can apply here.
To further accelerate the use of our frontier models for defensive cybersecurity work, we are committing $10 million in API credits for teams through our Cybersecurity Grant Program. We’re looking to partner with teams that have a proven track record of identifying and remediating vulnerabilities in open source software and critical infrastructure systems—teams can apply here.
Author
OpenAI
OpenAI
Help shape what we cover next Help bepalen wat we hierna volgen
Anonymous feedback, no frontend account needed. Anonieme feedback, zonder front-end account.
Watch related videos Bekijk gerelateerde video's
Open videos → Open video's →
Introducing ChatGPT Atlas ChatGPT Atlas geïntroduceerd
Introducing our new browser, ChatGPT Atlas. Sam Altman, Will Ellsworth, Adam Fry, Ben Goodger, Ryan O’Rouke, Justin Rushing, and Pranav Vishnu introduce ChatGPT Atlas — our new browser. Now available globally on macOS. Windows, iOS, and An... Maak kennis met onze nieuwe browser, ChatGPT Atlas. Sam Altman, Will Ellsworth, Adam Fry, Ben Goodger, Ryan O’Rouke, Justin Rushing en Pranav Vishnu introduceren ChatGPT Atlas — onze nieuwe browser. Nu wereldwijd beschikbaar op macOS. Windows, iOS en An...
Introducing GPT-5.5 GPT-5.5 geïntroduceerd
Introducing GPT-5.5 A new class of intelligence for real work and powering agents, built to understand complex goals, use tools, check its work, and carry more tasks through to completion. It marks a new way of getting computer work done.... GPT-5.5 introduceren: een nieuwe klasse intelligentie voor echt werk en het aansturen van agents, gebouwd om complexe doelen te begrijpen, tools te gebruiken, zijn werk te controleren en meer taken tot voltooiing te brengen. Het markeert een nieuwe manier om computerwerk gedaan te krijgen....
Introducing GPT-5 GPT-5 geïntroduceerd
Introducing GPT-5, our best AI system yet! GPT-5 features state-of-the-art performance across coding, math, writing assistance, health, visual perception, and more. Use GPT-5 to build websites, create apps, and tap into its improved writi... Maak kennis met GPT-5, ons beste AI-systeem tot nu toe! GPT-5 biedt toonaangevende prestaties op het gebied van coderen, wiskunde, schrijfondersteuning, gezondheid, visuele waarneming en meer. Gebruik GPT-5 om websites en apps te bouwen, en maak gebruik van de verbeterde schrijfmogelijkheden voor alledaagse taken zoals rapporten, e-mails en redigeren.
More from OpenAI Meer van OpenAI
All updates Alle updatesJust a moment... Zo begin je met Codex
Verification successful. Waiting for openai.com to respond Tips om Codex in te stellen, je eerste project te maken en echte taken af te ronden.
Working with Codex Werken met Codex
Title: Working with Codex Leer hoe je je Codex-werkruimte instelt en aan de slag gaat met threads en projecten.
GPT-5.5 Bio Bug Bounty GPT-5.5 Bio Bug Bounty
Title: GPT-5.5 Bio Bug Bounty Titel: GPT-5.5 Bio Bug Bounty
What is Codex? Wat is Codex?
Understand what Codex is and how it fits into your work Begrijp wat Codex is en hoe het in je werk past