Skip to content
TechRed.sh
Go back

When AI walks through MIE like it's a beaded curtain

Table of Content

When AI walks through MIE like it’s a beaded curtain

Apple spent five years and a mountain of cash building Memory Integrity Enforcement (MIE) for the M5 chips to kill off a whole class of memory corruption exploits. The security team at Calif used Anthropic’s Mythos Preview and landed a working macOS kernel exploit that bypasses MIE in… about five days.

The chain starts from a normal unprivileged local user on macOS 26.x and ends with a root shell, using only regular syscalls. They chained two bugs and “a handful of techniques” into a data-only kernel local privilege escalation, running on real M5 hardware with MIE enabled.

Humans still did the classic vuln research and exploit engineering. But Mythos helped find the bugs fast because they matched known vulnerability classes and then assisted throughout the exploit dev loop.

So yeah, the “AI found a path around Apple’s flagship mitigation in a week” headline isn’t hype. That’s the new floor.

Mythos in two coffees

Mythos Preview is Anthropic’s “too spicy to ship” model: a general-purpose LLM that happens to be terrifyingly good at offensive security.

In internal tests, Mythos has already found thousands of high-severity vulnerabilities across major operating systems and browsers, including decades-old bugs. It has successfully broken out of its own sandbox, chained Linux kernel bugs into full machine compromise, and dug up a 27-year-old OpenBSD issue that can crash any box running it.

The UK AI Security Institute saw it autonomously running multi-stage attacks on vulnerable enterprise networks and completing expert-level cyber ranges that older frontier models simply failed. On some high-end CTF-style tasks, it succeeds roughly three-quarters of the time, where previous models were stuck at beginner level two years ago.

Anthropic’s reaction: slam the brakes. Mythos is not public; access is restricted to a handful of big vendors under “Project Glasswing” for defensive cyber work.

So… is the pentest service dead?

Short answer: no. But the “scan + Nessus PDF = pentest” business model should probably update its CV.

A bunch of people instantly tried to pitch Mythos as an “AI red team in a box.” Anthropic and others have been very explicit: Mythos is not a pentest product, not a turnkey red-team platform, and not your new security department.

The Calif story is a good reality check. Mythos didn’t wake up one morning and decide to own macOS; a very strong team used it as a power tool inside a classic research workflow.

You still need:

AI doesn’t kill pentest. It kills slow, manual pentest that insists on pretending AI doesn’t exist.

What this changes day-to-day

For working pentesters and security engineers, Mythos-class models mainly do three things.

Result: anything that looks like “run tools, sift output, try obvious chains” becomes cheap and automated. Clients will expect more coverage, faster, and will be less excited to pay senior rates for tasks an LLM can do between two cron jobs.

Where humans still earn their badge

Mythos is very good at “given a target and permissions, break it.” It is much less good at everything around that.

Ironically, Mythos is being handed first to defenders at big shops so they can harden against Mythos-class attackers. The arms race is symmetric: your tools get stronger, so do theirs.

If you sell pentest services, adapt now

If your business card basically says “we run Burp and Nmap so you don’t have to,” you’re in trouble. Here’s the upgrade path.

The Calif MIE bypass is not the death of pentesting. It’s the warning shot that “manual only” pentesting is already obsolete.


Share this post on:

Next Post
llmfit, the Brutal Truth Machine