You mean this one? https://aisle.com/blog/ai-cybersecurity-after-mythos-the-jag...
That's the one that says:
> We took the specific vulnerabilities Anthropic showcases in their announcement, isolated the relevant code, and ran them through small, cheap, open-weights models. Those models recovered much of the same analysis.
Sounds like he applied exactly the same methodology then!