'This work is a glimpse of what is coming': Security team lays out how Anthropic Mythos helped build a working macOS exploit in five days
A product which took five years to build was broken into in five days
- Calif researchers used Anthropic’s Mythos Preview to chain two bugs and techniques into a macOS kernel exploit on Apple M5
- The exploit bypassed Apple’s new Memory Integrity Enforcement, achieving root shell in five days despite years of Apple investment
- Attack highlights Mythos’ power in surfacing unknown flaws; Apple is reportedly working on a fix
Cybersecurity researchers Calif have explained how they used Anthropic’s (now) famed Mythos Preview AI tool to create a working macOS kernel memory corruption exploit on Apple’s newest M5 silicon, warning their work was a “glimpse of what’s coming” for hardware and software that was built “in a world before Mythos Preview.”
In September 2025, Apple introduced a new security feature designed to block hacking techniques that exploit software memory flaws.
Called Memory Integrity Enforcement (MIE), the feature uses hardware-level memory checks to stop malicious code from accessing data it shouldn’t. It was released alongside the iPhone 17 lineup and the new A19 chips.
Execution model persists
In April 2026, Anthropic allowed a handful of technology companies, including Calif, to access Mythos Preview, so they could get a head start on everyone else and secure their environments.
The company claimed Mythos was capable of surfacing unknown vulnerabilities and creating working exploits and as such was too dangerous to just be released to the general public.
Calif used Mythos to link “two bugs and a handful of techniques to corrupt the Mac’s memory and then gain access to parts of the device that should be inaccessible.” Commenting on their findings, the Calif team said Apple spent five years and “probably billions” of dollars to build MIE, while they managed to break it in five days.
“The exploit is a data-only kernel local privilege escalation chain targeting macOS 26.4.1 (25E253),” Calif said in a Substack post. “It starts from an unprivileged local user, uses only normal system calls, and ends with a root shell. The implementation path involves two vulnerabilities and several techniques, targeting bare-metal M5 hardware with kernel MIE enabled.”
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Apparently, Apple is currently working on a fix. Probably using Mythos, too.

➡️ Read our full guide to the best antivirus
1. Best overall:
Bitdefender Total Security
2. Best for families:
Norton 360 with LifeLock
3. Best for mobile:
McAfee Mobile Security
Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds.
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.