The source code for Apple's iBoot has been posted on GitHub.
One of the core components of Apple's iOS operating system, it is responsible for launching a trusted boot of iOS.
Indeed, iBoot is the first program that gets kicked into action every time an iPhone is turned on. It ensures that the mobile operating system's kernel is approved by Apple and legitimate for use on an iPhone or iPad.
Apple keeps code like this firmly under lock and key, in a form of 'security through obscurity', as it is essential to the core functionality of iOS.
The code leaked onto GitHub claims to be designed for iOS 9 but much of it is likely to be found in iOS 11, making the leak potentially dangerous to Apple's mobile software.
Having access to such source code is one way for security researchers to find flaws in source code and report any bugs they might throw up that could be exploited by hackers.
iBoot is the one component Apple has been holding on to, still encrypting its 64-bit image... now it's wide open in source code form.
However, making the code public could allow intrepid hackers to sniff around in iBoot and find their own vulnerabilities, only instead of reporting them to Apple, they could tap into the flaws and use them as vectors of attack against iOS.
The iBoot source code could also enable programmers to eventually find a way to emulate iOS on devices other than iPhones and iPads, which would be a big thorn in Apple's closed ecosystem approach.
Two researchers have confirmed to Motherboard that the code is indeed real as they were able to reverse engineer it.
Apple iOS and MacOS specialist Jonathan Levin told the website that the iBoot posting is "the biggest leak in history".
He continued: "iBoot is the one component Apple has been holding on to, still encrypting its 64-bit image... now it's wide open in source code form."
Thanks to the use of the Secure Enclave Processor chip in modern iPhones, jailbreaking iOS and accessing a phone's data has been made into an unattractive challenge by Apple.
But leaks of this kind potentially open up the scope for iPhone hacking and no doubt a degree of furore will be churning away in communities that love nothing more than getting stuck into a piece of private code.
Apple hasn't yet responded to the leak.
In fear of future shortage - or in preparation for its own electric car project?
New Spectre microcode patches released by Intel to fix security flaws in Skylake, Kaby Lake and Coffee Lake CPUs
But if you're running anything older you'll have to wait
Powered by servers based on Qualcomm's scalable 48-core Centriq 2400 10nm CPUs
Malware has been in circulation for more than a year