Anthropic's new Claude Mythos model has already uncovered thousands of critical vulnerabilities — some of them hidden in production software for 27 years. The cybersecurity conversation has focused on operating systems, browsers, and cloud infrastructure, but mobile apps sit squarely in the blast radius. If your iOS or Android app ships without code hardening, runtime protection, and continuous security testing, an AI agent will find the cracks long before your next release.
An AI model just rewrote the threat model
On April 15, 2026, the industry began absorbing what Consultancy.eu called a "shockwave through the cybersecurity landscape": Anthropic's Claude Mythos is so effective at finding software flaws that it isn't being released to the public. Instead, access is restricted to a small consortium — "Project Glasswing" — so companies like Apple, AWS, Google, Microsoft, and NVIDIA can patch what the model finds before attackers do. And buried inside Anthropic's own red-team preview of the model is a finding that, frankly, stopped me cold: a 27-year-old bug in OpenBSD.
For anyone who didn't cut their teeth on it, OpenBSD is the project whose tagline — "Only two remote holes in the default install, in a heck of a long time" — was half-joke, half-mission statement. I ran OpenBSD on the edge of the ISP I worked at back in the 1990s. It was the operating system you picked when "secure by default" actually had to mean something, because your pager would go off if it didn't. Proactive code audits, memory-safety work, privilege separation, pledge, unveil — OpenBSD spent thirty years being the most paranoid, most carefully reviewed Unix on the planet.
The bug Mythos Preview surfaced is a textbook example of why that matters. It lives in OpenBSD's TCP Selective Acknowledgement (SACK) implementation, added to the kernel in 1998 shortly after RFC 2018 standardized SACK. OpenBSD tracks SACK state as a singly linked list of "holes" — byte ranges sent but not yet acknowledged. A subtle logic mistake, pivoting on a signed-integer overflow in the 32-bit TCP sequence-number comparison (int)(a - b), makes a normally unreachable codepath reachable. The net effect: a remote attacker can repeatedly crash any OpenBSD host that responds over TCP. Firewalls. Routers. Core internet plumbing. A denial-of-service primitive sitting in the network stack, untouched, for 27 years of some of the most adversarial human code review on the planet — found autonomously by an AI model for, per Anthropic's own figures, under $50 of compute on the run that surfaced it. If an AI can shake loose a latent flaw there, the baseline assumption for every other piece of software on earth needs to be re-examined.
The numbers are staggering. Thousands of critical vulnerabilities. Bugs that survived nearly three decades of code review. And as AI security expert Nanne van 't Klooster of Rewire put it, we are now watching "an arms race between autonomous AI agents — one that humans can no longer keep up with."
Read that sentence again. Then open your mobile app's repo.
Why mobile developers need to take this seriously
If you build mobile apps, it is tempting to watch this story from a distance. Claude Mythos is chasing OS-level flaws. The headlines name chipmakers and hyperscalers. Mobile apps don't appear in the press release.
That is exactly the problem.
The same AI capability that finds decades-old bugs in kernels will absolutely be turned on compiled mobile binaries. Everyone is a target, no one is too small. Mobile apps are:
- Distributed as binaries. Anyone can pull your IPA or APK off a device and reverse-engineer it. There is no server in the way.
- Handling the crown jewels. Authentication tokens, session cookies, payment credentials, cryptographic keys, health records, location data. Mobile is where the sensitive stuff lives.
- Widely deployed and slow to patch. Even when you ship a fix, users lag behind for weeks or months.
- Built on third-party dependencies. A single vulnerable SDK can expose millions of installs.
When autonomous agents can systematically explore every pathway in your app, your obscurity is no longer a defense. If your app's logic is readable, your logic will be read.
The mobile threat landscape, in plain terms
Guardsquare's overview of mobile app security makes the point bluntly: too many mobile projects treat security as an afterthought. Research cited on that page is hard to ignore — roughly three quarters of developers admit iOS and Android standard security isn't sufficient, many still rely on the OS alone, and 95% of survey respondents see room to improve their security program.
The recent Coruna and DarkSword iOS exploit kits are a preview of what's coming. As Guardsquare's research team documented, a single visit to a compromised site can bypass iOS sandboxing, hook sensitive functions inside your app, and exfiltrate credentials and keys in real time. Function hooks sit at the top of a method and redirect execution to the attacker's code before your logic runs. Hook SecTrustEvaluateWithError() to always return true, and SSL pinning is gone. Hook Keychain access, and your secrets walk out the door.
Now imagine that threat class accelerated by a model like Claude Mythos — an AI agent enumerating hook targets, chaining primitives, and writing working exploit code on its own timeline. Don't assume the operating system is a walled garden protecting your app's memory. The new exploits, and the new models, are a wake-up call.
What mobile app security actually looks like
Mobile application security is the protection of mobile apps against cyber attacks across the full software development lifecycle. It isn't one control. It's layers, and each layer reinforces the others. The practical pillars:
Mobile application security testing (MAST). Scan your code and dependencies continuously, early, and in your CI pipeline. The earlier an issue is found, the cheaper it is to fix.
Code hardening and obfuscation. Rename symbols, obfuscate control flow, encrypt strings, and virtualize sensitive routines so your binary doesn't read like source code when an attacker — or an AI agent — disassembles it.
Runtime application self-protection (RASP). Detect jailbreaks, root access, debuggers, hooks, emulators, and tampered system libraries at runtime, and respond — crash, degrade, revoke sessions, alert the backend.
App attestation. Prove that the app talking to your API at runtime is a genuine, unmodified build on a trustworthy device.
Threat monitoring. See what's actually happening in the wild, because static assumptions don't survive contact with real users and real attackers.
Single-layer defenses fall. Layered defenses make each successive step exponentially harder. That is the whole game.
How AppSweep fits in: shift security left, catch issues before release
AppSweep is Guardsquare's mobile application security testing platform, and it's built for the way modern mobile teams actually work.
- Multi-analysis testing — static and interactive — tuned specifically for iOS and Android risks, not generic web scanners awkwardly retrofitted to binaries.
- OWASP MASVS-aligned findings that prioritize what matters and map directly to the industry standard your auditors already know.
- CLI-first CI integration with Bitrise, Fastlane, GitHub Actions, Jenkins, and the rest of your DevOps toolchain. Every build gets scanned. Regressions get caught before they ship.
- Developer-first UI that produces actionable remediation guidance rather than a 400-page PDF nobody reads.
In a world where AI agents can enumerate every weakness in your compiled app, shipping without automated mobile security testing is like pushing to production without unit tests.
Yes, these are the ProGuard people
Worth pausing on this, because it matters: Guardsquare is the team behind ProGuard, the open-source shrinker, optimizer, and obfuscator that has been the default bytecode-processing step for Android developers for more than a decade. If you've shipped an Android app, you've almost certainly shipped with ProGuard — or with R8, the Android Gradle Plugin's ProGuard-compatible successor that still consumes ProGuard configuration syntax.
Anyone who shipped non-trivial Android apps in the 2010s remembers the ritual. I certainly do. Back when I was working on Xamarin.Android apps that sat on top of native Android code and bound Java libraries, I spent more hours than I'd like to admit hand-tuning proguard.cfg files to make sure controls, custom renderers, and reflection-accessed types didn't get stripped.
Xamarin.Android actually had two tree-shakers in the pipeline, and it's worth being precise about which did what:
-
The Xamarin/Mono managed linker (later evolved into
ILLinkin .NET) operated on the managed .NET IL side. It aggressively removed .NET types and members it couldn't prove were reachable. Anything accessed via reflection — customXamarin.Formsrenderers, value converters, effects, platform-specific controls — would disappear silently unless you annotated them with[Preserve]or added aLinkDescription.xml. SettingLinker behaviortoLink All Assembliesand watching half your UI vanish at runtime was a rite of passage. -
ProGuard (and, in later toolchains, R8) operated on the Java bytecode side. It shrank the compiled Android code and any bound Java libraries. Miss a
-keeprule for a class that was only referenced from JNI, from anAndroidManifest.xmlentry, from a bound AAR, or from a library's reflection-based DI, and you'd get aClassNotFoundExceptionorNoSuchMethodErrorat runtime — usually only in a release build, because debug builds typically skipped shrinking.
The classic debugging loop was: ship a release build to UAT, watch a control fail to render or a callback fail to fire, grep the ProGuard mapping file, add a -keep class com.example.** rule, rebuild, repeat. Painful. But there was an unambiguous upside — the APK shrank. Dead code, unused library surface area, and unreachable methods all got cut. Smaller download, faster cold start, less memory pressure.
And here is the point that maps directly onto the Claude Mythos moment: code you don't ship is code that can't be attacked. Unused methods are ROP/JOP gadgets waiting to be chained. Unused reflection entry points are pivots. Unused debug scaffolding is a map of your app's internals sitting on every user's device. An unused vulnerable dependency is still a vulnerable dependency if its classes are in your DEX. Dead code is attack surface.
Shrinking is a security control, not just a size optimization. ProGuard's minification, combined with renaming and optimization, quietly removes functionality that an attacker — or an autonomous AI agent enumerating your binary — would otherwise have available to misuse. The same discipline that kept our Xamarin builds small is the discipline that keeps a modern app's attack surface tight.
iXGuard, DexGuard, and AppSweep are what happens when the people who wrote the tool the industry already trusts take that philosophy — remove what you don't need, protect what you do — and extend it to the full scope of modern mobile threats: static analysis, runtime attacks, supply-chain exposure, and the coming AI-driven wave.
The Claude Mythos lesson for mobile teams
Claude Mythos is a single data point in a much larger trend. The lesson is not "panic about one model." The lesson is:
- Vulnerabilities that survived human review for 27 years were found in days.
- Organizations with resources are racing to patch before the model goes public.
- Mobile apps, which ship their attack surface directly to every user's pocket, are possibly next.
If your mobile security program is one annual pen test and a hope that the OS will hold, you are running on borrowed time. The organizations that come through the next 12 months intact are the ones that treat mobile app security the way they treat version control — continuous, layered, automated, and non-negotiable.
Research mobile app security before you ship another release
You don't need to buy anything today. You do need to know more than you did yesterday. This is real technical debt!
Start here. Read What is Mobile App Security. Learn the vocabulary — code hardening, RASP, obfuscation, attestation, MAST, OWASP MASVS. Understand the specific threats facing iOS and Android apps, and understand what a real defense-in-depth program looks like on mobile.
Then go deeper. Evaluate where your own app stands. Is your binary readable? Do you detect hooking? Are your builds scanned in CI? Does your security testing produce findings your developers actually fix? Look at AppSweep for testing and iXGuard for iOS hardening, and benchmark whatever you're doing today against what a layered program can look like.
Then act. The gap between organizations that take mobile app security seriously and organizations that don't is about to widen dramatically. The question is no longer if your mobile app will be targeted by an AI-assisted attacker. It's when — and whether you'll be ready.
Frequently Asked Questions
What is Claude Mythos?
Claude Mythos is an AI model from Anthropic, released in April 2026, that has demonstrated the ability to identify thousands of critical security vulnerabilities in operating systems and browsers — including flaws that went undetected for up to 27 years. Anthropic has restricted access to a consortium of major technology companies through an initiative called Project Glasswing so they can remediate before broader release.
Why does Claude Mythos matter for mobile app developers?
AI models capable of finding deep vulnerabilities in system software will be turned on mobile binaries next. Mobile apps ship their attack surface directly to end users, handle high-value data, and are frequently under-protected. Developers who rely on OS security alone are increasingly exposed.
What is mobile app security?
Mobile app security is the practice of protecting mobile applications from cyber attacks throughout the development lifecycle. It includes security testing, code hardening, obfuscation, runtime application self-protection (RASP), app attestation, and threat monitoring.
What is AppSweep?
AppSweep is Guardsquare's mobile application security testing tool. It performs static and interactive analysis of iOS and Android apps, aligns findings with OWASP MASVS, and integrates directly into CI/CD pipelines such as GitHub Actions, Fastlane, Bitrise, and Jenkins.
What is iXGuard?
iXGuard is Guardsquare's iOS app hardening product. It applies polymorphic, compiler-based obfuscation and runtime protections to defend iOS apps against static analysis, reverse engineering, dynamic instrumentation, hooking, and tampering.
Is Guardsquare the company behind ProGuard?
Yes. Guardsquare is the team behind ProGuard, the widely used open-source shrinker and obfuscator for Java bytecode. iXGuard, DexGuard, and AppSweep extend that heritage into comprehensive mobile application security.
What should I do right now?
Research mobile app security. Understand the threats, the defensive layers, and how your current app stacks up. The sources linked throughout this article are a strong starting point.
Sources:
- AI model Claude Mythos sends shockwaves through cybersecurity landscape — Consultancy.eu
- Mythos Preview — Anthropic Red Team
- What is Mobile App Security — Guardsquare
- AppSweep Mobile Application Security Testing — Guardsquare
- iXGuard iOS App Security — Guardsquare
- Can Your App Survive Coruna and DarkSword iOS Exploits? — Guardsquare
Top comments (0)