Research

Independent vulnerability research on iOS and adjacent surfaces. Approach pairs targeted reverse engineering with AI-assisted analysis at scale.

Published Disclosures

Current Findings

EN-0004 2026-04 iOS 26.x

IOSurface — Destructor-Order Use-After-Free

An object is unlinked and freed during its own teardown path before the base-destructor chain completes.

Research stage

EN-0003 2026-04 iOS 26.x

AppleJPEGDriver — Out-of-Bounds Read

A user-controlled length field in the decode path is not bounds-checked against the in-bounds tail size. Triggerable from app sandbox with no entitlements.

Reproducible PoC

EN-0002 2026-04 iOS 26.x

AppleJPEGDriver — Input-Lifetime Use-After-Free

Pointers into caller-owned externalMethod input storage are retained in a queued request and dereferenced after the storage has gone out of scope. Triggerable from app sandbox with no entitlements.

Reproducible PoC

EN-0001 2026-04 iOS 26.x

AppleJPEGDriver — Stack-Lifetime Use-After-Free

Pointers to stack-resident encode data are retained across function return in a queued request path. Triggerable from app sandbox with no entitlements.

Reproducible PoC

Inquiries: contact@enfilade.io · PGP