
A Government iPhone Exploit Just Leaked on GitHub — Update Now
A nation-state exploit kit called DarkSword just showed up on GitHub. It chains six vulnerabilities — three of them zero-days — into a full device takeover of any iPhone running iOS 18 or earlier. This isn't theoretical. The code is public. Anyone can download it. What DarkSword Actually Is DarkSword is a complete exploit chain. It targets iPhones through a series of vulnerabilities (CVE-2026-20700, CVE-2025-43529, CVE-2025-14174, plus three others) that together give an attacker full access to the device — messages, photos, microphone, location, everything. This was originally a government surveillance tool. The kind of thing sold to intelligence agencies for millions of dollars. Someone leaked the full source code to a public GitHub repository. TechCrunch, The Hacker News, and CyberScoop all confirmed the leak independently. Cybersecurity researchers have verified the exploits work against unpatched devices. Who's at Risk Hundreds of millions of iPhones. If you're running iOS 18 with
Continue reading on Dev.to
Opens in a new tab



