Anthropic’s Mythos AI Helps Researchers Find macOS Vulnerability Chain That Could Bypass Apple Security


Security researchers at Calif used techniques from Anthropic’s Mythos AI model to find a new macOS exploit chain that could bypass some of Apple’s strongest security protections, according to a new report.

The research focused on two previously undocumented macOS vulnerabilities that Calif’s team linked together into a privilege escalation exploit. If attackers combined that chain with other bugs, they could potentially gain deeper control over a targeted Mac.

Apple has received a detailed technical report from Calif and is reviewing the findings. Full technical details have not been released publicly, which follows standard security practice while a vendor investigates and prepares fixes.

What Calif Researchers Found

Calif, a Palo Alto-based security research company, reportedly found a way to corrupt Mac memory and reach areas of the operating system that should remain blocked from normal software processes.

The exploit does not appear to work as a remote worm or one-click attack by itself. The important point is that it shows how AI-assisted research can help skilled security teams find paths through modern defensive systems faster than before.

Calif’s team reportedly built the working exploit in five days, but the company stressed that Mythos did not complete the attack alone. Human researchers still had to guide the process, validate the output, and combine the bugs into a real exploit chain.

DetailWhat Was Reported
Company involvedCalif, a Palo Alto-based security research firm
AI model usedAnthropic’s Claude Mythos Preview
TargetApple macOS
Exploit typePrivilege escalation chain
Reported impactPotential access to restricted parts of the Mac operating system
StatusApple is reviewing the findings, while public technical details remain withheld

Why The macOS Vulnerabilities Matter

The findings matter because Apple has spent years hardening its platforms against memory corruption attacks. These attacks often sit at the center of advanced spyware and exploit chains because they can help attackers break out of normal app limits.

Apple introduced Memory Integrity Enforcement as a major step toward stronger memory safety. The company describes it as a broad defense that combines Apple silicon hardware, secure memory allocators, Enhanced Memory Tagging Extension, and operating system protections.

Calif’s research suggests that even advanced security layers can still face pressure from AI-assisted vulnerability discovery. The issue is not only whether one Mac bug gets patched. The larger concern is how quickly future AI systems may help researchers and attackers find similar chains.

Mythos Is Not A Public AI Tool

Anthropic has not released Claude Mythos Preview to the public. The company has described it as a powerful research model that can find and exploit zero-day vulnerabilities when directed by a user.

Mythos is part of Anthropic’s Project Glasswing, a defensive security program designed to give selected organizations controlled access to the model. Anthropic says the program focuses on finding and fixing vulnerabilities in critical systems before attackers can use similar capabilities.

The company has said Project Glasswing partners will use Mythos for work such as local vulnerability detection, black-box binary testing, endpoint security, and penetration testing. Anthropic also committed $100 million in model usage credits to the program.

  • Mythos remains gated and unavailable to the general public.
  • Project Glasswing focuses on defensive security research.
  • Partners use the model to find weaknesses in important software systems.
  • Anthropic has warned that models with this level of security capability need strict safeguards.

Apple Is Reviewing The Report

Calif reportedly delivered a 55-page report to Apple in person. Apple said it takes reports of potential vulnerabilities seriously and is reviewing the findings.

Apple’s public security policy says the company does not confirm, discuss, or disclose security issues until investigation finishes and any needed updates become available. This means users should not expect full technical details before Apple completes its review and ships fixes.

Apple’s macOS Tahoe 26.5 security notes already list a kernel-level vulnerability credited to Calif and Anthropic. However, public reporting says it remains unclear whether that fix fully addresses the same exploit chain described in the Mythos report.

What Mac Users Should Do Now

There is no public evidence that the reported Calif exploit chain has been used in real-world attacks. There is also no public proof-of-concept code available for ordinary attackers to copy.

Still, Mac users should treat this as another reminder to keep macOS updated. Security fixes often arrive before public technical details, especially when a vulnerability could help attackers build more dangerous exploit chains.

For most users, the practical advice is simple: install the latest macOS updates, avoid unknown software, and keep apps updated from trusted sources.

  • Install the latest macOS security updates when they appear.
  • Restart your Mac after major updates so fixes fully apply.
  • Avoid unsigned or suspicious apps from unknown sources.
  • Keep browsers, productivity apps, and security tools updated.
  • High-risk users should review Apple’s Lockdown Mode protections.

AI Security Research Is Moving Faster

The Mythos report shows how AI can change vulnerability research. A skilled team can use a model to explore code paths, test assumptions, and identify weaknesses much faster than traditional manual research alone.

That speed can help defenders patch long-hidden bugs. Anthropic has said Mythos previously helped find vulnerabilities across major operating systems and browsers, including a now-patched 27-year-old OpenBSD bug.

The same speed also creates risk. If similar capabilities reach attackers without proper controls, software vendors may face more vulnerability reports, shorter patch windows, and more pressure to harden products before flaws become public.

FAQ

Did Anthropic’s Mythos AI find macOS vulnerabilities?

Researchers at Calif reportedly used techniques from Anthropic’s Claude Mythos Preview to uncover two macOS vulnerabilities and combine them into a privilege escalation exploit chain.

Can the reported macOS exploit take over a Mac by itself?

The exploit was described as a privilege escalation chain. Reports say it could help an attacker gain deeper access if combined with other attacks, but it has not been described as a self-spreading remote worm.

Has Apple patched the macOS vulnerabilities found with Mythos?

Apple is reviewing Calif’s report. Apple’s macOS Tahoe 26.5 notes credit Calif and Anthropic for a kernel vulnerability, but public reports say it remains unclear whether that update fully covers the same exploit chain.

Is Anthropic’s Mythos AI available to the public?

No. Anthropic has said Claude Mythos Preview is not generally available. It is being shared through controlled programs such as Project Glasswing for defensive security research.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages