'This work is a glimpse of what is coming': Security team lays out how Anthropic Mythos helped build a working macOS exploit in five days

Password recovery concept image showing man typing on a keyboard with an overlay imitating password recovery and data recovery principles
(Image credit: Shutterstock)

  • Calif researchers used Anthropic’s Mythos Preview to chain two bugs and techniques into a macOS kernel exploit on Apple M5
  • The exploit bypassed Apple’s new Memory Integrity Enforcement, achieving root shell in five days despite years of Apple investment
  • Attack highlights Mythos’ power in surfacing unknown flaws; Apple is reportedly working on a fix

Cybersecurity researchers Calif have explained how they used Anthropic’s (now) famed Mythos Preview AI tool to create a working macOS kernel memory corruption exploit on Apple’s newest M5 silicon, warning their work was a “glimpse of what’s coming” for hardware and software that was built “in a world before Mythos Preview.”

In September 2025, Apple introduced a new security feature designed to block hacking techniques that exploit software memory flaws.

Called Memory Integrity Enforcement (MIE), the feature uses hardware-level memory checks to stop malicious code from accessing data it shouldn’t. It was released alongside the iPhone 17 lineup and the new A19 chips.

Latest Videos From

Execution model persists

In April 2026, Anthropic allowed a handful of technology companies, including Calif, to access Mythos Preview, so they could get a head start on everyone else and secure their environments.

The company claimed Mythos was capable of surfacing unknown vulnerabilities and creating working exploits and as such was too dangerous to just be released to the general public.

Calif used Mythos to link “two bugs and a handful of techniques to corrupt the Mac’s memory and then gain access to parts of the device that should be inaccessible.” Commenting on their findings, the Calif team said Apple spent five years and “probably billions” of dollars to build MIE, while they managed to break it in five days.

“The exploit is a data-only kernel local privilege escalation chain targeting macOS 26.4.1 (25E253),” Calif said in a Substack post. “It starts from an unprivileged local user, uses only normal system calls, and ends with a root shell. The implementation path involves two vulnerabilities and several techniques, targeting bare-metal M5 hardware with kernel MIE enabled.”

Apparently, Apple is currently working on a fix. Probably using Mythos, too.


Best antivirus software header
The best antivirus for all budgets

Google logo on a black background next to text reading 'Click to follow TechRadar'

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds.


Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.