Anthropic Mythos AI helps researchers expose macOS vulnerabilities in Apple M5 systems

Reviewed byNidhi Govil

3 Sources

Share

Security firm Calif used Anthropic's Claude Mythos Preview to discover new macOS vulnerabilities affecting Apple M5 systems. The AI tool helped researchers develop a privilege escalation exploit in less than a week, bypassing Apple's Memory Integrity Enforcement protections. Apple is now investigating the findings, marking a significant moment in AI-assisted cybersecurity research.

Security Researchers Uncover Critical macOS Vulnerabilities Using AI Tool

Security researchers at Calif, a Palo Alto-based cybersecurity firm, have used Anthropic Mythos to expose significant macOS vulnerabilities that challenge Apple's state-of-the-art security technology

1

. The discovery, made possible through Anthropic's Claude Mythos Preview under Project Glasswing, demonstrates how AI in cybersecurity is reshaping vulnerability research at an unprecedented pace

2

.

Source: Decrypt

Source: Decrypt

The team at Calif developed what they describe as the first public macOS kernel memory corruption exploit capable of surviving Apple's new Memory Integrity Enforcement (MIE) protections on M5 hardware

3

. What makes this discovery particularly noteworthy is the speed at which it occurred. Security researchers accidentally found the bugs on April 25 and had developed a working exploit by May 1—less than a week later

3

.

How the Apple M5 System Exploited Became Possible

The software vulnerabilities discovered by Calif link together two bugs and multiple techniques to corrupt the Mac's memory, then gain access to parts of the device that should remain inaccessible

1

. This creates what's known as a privilege escalation exploit—a type of attack that, when chained with other exploits, could allow a hacker to seize complete control of the computer.

The attack path targets macOS 26 running on Apple M5 systems, starting from an unprivileged local user account and escalating to root access using standard system calls

3

. Memory corruption bugs remain one of the most common methods attackers use to break into operating systems because they can crash programs, steal data, or enable complete system takeover. Apple's MIE feature uses memory-tagging technology specifically designed to make such attacks significantly harder to execute.

The Role of Human Expertise Alongside AI Tool Capabilities

While Anthropic Mythos played a crucial role in identifying the macOS security vulnerability, Calif's chief executive Thai Duong emphasized that the attack "couldn't have been pulled off by Mythos alone and leveraged the very human cybersecurity expertise of some of Calif's hackers"

1

. The researchers noted that Claude Mythos Preview helped identify the vulnerabilities and assisted throughout exploit development, but human expertise remained necessary to bypass Apple's new MIE protections

3

.

Source: MacRumors

Source: MacRumors

This collaboration between AI and security researchers reveals an important dynamic in modern cybersecurity work. "Part of our motivation was to test what's possible when the best models are paired with experts," Calif wrote. "Landing a kernel memory corruption exploit against the best protections in a week is noteworthy, and says something strong about this pairing"

3

.

Apple's Response and What Comes Next

Apple is currently reviewing Calif's report to validate its findings. An Apple spokesperson told The Wall Street Journal: "Security is our top priority, and we take reports of potential vulnerabilities very seriously"

1

. Calif assembled a comprehensive 55-page report that it delivered in person to Apple at the company's Cupertino headquarters

1

.

Duong told the WSJ that he expects the bugs "will likely be fixed pretty quickly"

1

. Apple's security notes for the macOS 26.5 update released this week mention a fix for a kernel-level vulnerability, crediting Calif and Anthropic for discovering it, though the timeline remains somewhat unclear

2

.

Source: 9to5Mac

Source: 9to5Mac

Calif plans to release detailed information about its discoveries once Apple addresses the underlying issues

1

. The company chose to report the findings in person rather than risk "getting buried in the submission flood that some unfortunate Pwn2Own participants just experienced"

3

.

Implications for AI-Assisted Vulnerability Research

Anthropic released the preview version of Mythos in April after internal testing and outside evaluations suggested the model could autonomously identify and exploit software vulnerabilities at a level beyond previous public AI models

3

. Rather than releasing it publicly, Anthropic restricted access to select technology companies, banks, and security researchers under its Project Glasswing initiative.

Mozilla reported that Mythos identified 271 vulnerabilities in Firefox during internal testing, while the U.K.'s AI Security Institute found the model could autonomously complete sophisticated cyberattack simulations

3

. These findings demonstrate the model's capabilities across different platforms and attack scenarios.

Calif called the Apple M5 exploit "a glimpse of what is coming," noting that "Apple built MIE in a world before Mythos Preview. We're about to learn how the best mitigation technology on Earth holds up during the first AI bugmageddon"

3

. This statement raises questions about whether existing security defenses, even the most advanced ones, can withstand the accelerated pace of AI-assisted vulnerability discovery. Developers and security teams should watch closely as this technology becomes more widely available, potentially forcing a fundamental shift in how quickly patches must be developed and deployed.

Today's Top Stories

TheOutpost.ai

Don’t drown in AI news. We cut through the noise - filtering, ranking and summarizing the most important AI news, breakthroughs and research daily. Spend less time searching for the latest in AI and get straight to action.

Instagram logo
LinkedIn logo
Youtube logo
© 2026 TheOutpost.AI All rights reserved