Calif breaks Apple M5 security with Claude Mythos
Security firm Calif developed a macOS kernel exploit that bypasses Apple's M5 Memory Integrity Enforcement. The local privilege escalation was chained in just five days using Anthropic's restricted Claude Mythos model.
This is a watershed moment for AI-assisted offensive security, proving that frontier models can drastically compress the timeline for weaponizing zero-day vulnerabilities against hardened hardware.
- –Calif bypassed Apple's flagship Memory Integrity Enforcement (MIE) on M5 silicon to achieve root access in macOS 26.4.1.
- –Anthropic's Claude Mythos, accessed via the restricted Project Glasswing, assisted in discovering and chaining the two underlying kernel bugs.
- –The five-day turnaround from initial bug discovery to a working exploit demonstrates the speed multiplier AI brings to vulnerability research.
- –The incident underscores why models with advanced autonomous cyber capabilities remain tightly gated from public release.
DISCOVERED
1h ago
2026-05-15
PUBLISHED
2h ago
2026-05-15
RELEVANCE
AUTHOR
Wes Roth