Close Menu
Xarkas BlogXarkas Blog
    What's Hot

    The all-electric Jeep Recon is finally here

    November 19, 2025

    Best DS20 Mirage Loadout in COD Black Ops 7

    November 19, 2025

    Android 17 Reportedly Getting Big Gaming Boost With Native Controller Remapping

    November 19, 2025
    Facebook X (Twitter) Instagram
    Xarkas BlogXarkas Blog
    • Tech News

      The all-electric Jeep Recon is finally here

      November 19, 2025

      Tesla receives ride-hailing permit in Arizona in last required step to launch robotaxi service

      November 19, 2025

      AI data center provider Lambda raises whopping $1.5B after multibillion-dollar Microsoft deal 

      November 19, 2025

      Poe’s AI app now supports group chats across AI models

      November 18, 2025

      Hidden Dangers Inside AI Browsers

      November 18, 2025
    • Mobiles

      Android 17 Reportedly Getting Big Gaming Boost With Native Controller Remapping

      November 19, 2025

      Xiaomi 17 Ultra Launch Expected to Take Place Earlier Than Expected: Check Expected Specifications

      November 19, 2025

      Exclusive: iQOO 15 India Price Range Confirmed Ahead of Official Launch on November 26

      November 18, 2025

      OPPO Find X9, Find X9 Pro Launched in India with MediaTek Dimensity 9500 SoC, Hasselblad Cameras, ColorOS 16

      November 18, 2025

      OPPO Find X9 Series Launching in India at 12 noon Today: How to Watch the Livestream? What to Expect

      November 18, 2025
    • Gaming

      Best DS20 Mirage Loadout in COD Black Ops 7

      November 19, 2025

      How to Get Twitch Drops

      November 19, 2025

      Roblox will require all users to perform age checks to access chat starting in January

      November 19, 2025

      Roblox will require all users to perform age-checks to access chat from January

      November 18, 2025

      Where to Get Drunken Poet Skill in Where Winds Meet

      November 18, 2025
    • SEO Tips
    • PC/ Laptops

      ASUS Unveils ProArt P16 Laptop For Creators In India

      November 18, 2025

      Apple Reportedly Reserving OLED Displays for M6 Pro and M6 Max MacBook Pro Models

      November 10, 2025

      Apple Reportedly Working on a Budget MacBook Featuring iPhone Chip: Expected Launch and Price

      November 5, 2025

      Acer Predator Helios Neo 16 AI and 16S AI Gaming Laptops Launched in India: Check Pricing and Specifications

      November 4, 2025

      COLORFUL Launches Rimbook L1: Affordable Laptop For Everyday Use

      November 4, 2025
    • EV

      Here’s How Much It Costs

      November 15, 2025

      Sodium-Ion Batteries Have Landed In America. The Hard Part Starts Now

      November 15, 2025

      Mazda Begins Testing Its Long-Overdue U.S. EV

      November 14, 2025

      Volkswagen Adds Smartwatch Support For U.S. Vehicles

      November 14, 2025

      TATA.ev expands charging footprint with 14 new manned MegaChargers across AP, Telangana

      November 14, 2025
    • Gadget
    • AI
    Facebook
    Xarkas BlogXarkas Blog
    Home - Featured - Hidden Dangers Inside AI Browsers
    Featured

    Hidden Dangers Inside AI Browsers

    KavishBy KavishNovember 18, 2025No Comments7 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Hidden Dangers Inside AI Browsers
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email


    AI browsers, like Perplexity’s Comet and Brave’s Leo, can offer conveniences not found in conventional browsers, but they also pose potentially higher risks.

    “The ability to quickly gather and summarize available information without having to invest hours of clicking and reading is incredibly valuable,” observed Andy Bennett, CISO of Apollo Information Systems, a provider of cybersecurity and IT solutions, in Dallas.

    “At the same time, AI browsers bring analysis and enable the user to glean insights that would normally take a lot of time or be missed altogether,” he told TechNewsWorld. “AI can help find information across a broader number of sources than a user can physically or manually process in a traditional browser experience.”

    But with that great power comes great risk, as researchers at Brave explained in a blog post:

    “Instead of just asking ‘Summarize what this page says about London flights,’ you can command: ‘Book me a flight to London next Friday.’ The AI doesn’t just read, it browses and completes transactions autonomously.”

    They went on to note: “This kind of agentic browsing is incredibly powerful, but it also presents significant security and privacy challenges. As users grow comfortable with AI browsers and begin trusting them with sensitive data in logged-in sessions — such as banking, health care, and other critical websites — the risks multiply.”

    “What if the model hallucinates and performs actions you didn’t request?” they asked. “Or worse, what if a benign-looking website or a comment left on a social media site could steal your login credentials or other sensitive data by adding invisible instructions for the AI assistant?”

    Table of Contents

    Toggle
    • Hidden Instructions Risk
    • Trading Accusations
    • More Dangerous Than Your Average Web Browser
    • One Click From Chaos

    Hidden Instructions Risk

    The researchers actually found a “hidden instructions” vulnerability in the Comet browser. When told to summarize a web page, the browser feeds the page into its large language model (LLM) without distinguishing between the user’s instructions and untrusted content on the page. “This allows attackers to embed indirect prompt injection payloads that the AI will execute as commands,” they explained.

    “Prompt injection is a concern for all AI agents, but a particularly acute one for AI browsers,” observed Lionel Litty, CISO and chief security architect at Menlo Security, a browser security provider, in Mountain View, Calif.

    “That is because web content is inherently untrusted and often aggregated from many sources,” he told TechNewsWorld. “Even when visiting a trusted e-commerce site, the content the AI browser sees may include reviews from customers and ads from third parties, all possible sources of prompt injection.”

    “In general, network tools are ill-positioned to address prompt injection, as they have a very limited understanding of browsing activities,” he added. “Solutions are needed that understand the full context of the browsing session and can proactively protect the agent by adding hard guardrails.”

    Trading Accusations

    Security was cited among the reasons Amazon ordered Perplexity to remove the internet retailer from the Comet experience.

    “Perplexity’s Terms of Use and Privacy Notice grant it broad rights to collect passwords, security keys, payment methods, shopping histories, and other sensitive data from customers accessing the Amazon Store or other third-party websites, while disclaiming any responsibility for data security,” Amazon wrote in a “Cease and Desist” letter sent to Perplexity.

    “At the same time,” it continued, “Perplexity is intentionally evading Amazon’s identification of the Comet AI agent when it accesses the Amazon Store, and thereby directly interfering with Amazon’s efforts to manage security risks. This is particularly troubling given recent reports showing that Comet AI is vulnerable to prompt injection attacks, phishing, scams, and other forms of cyberattacks.”

    Perplexity countered that Amazon’s real goal is to safeguard its lucrative ad-driven business model. When an AI agent is tasked simply with buying the cheapest laundry detergent, it skips the sponsored results, upsells, and confusing offers that generate revenue for Amazon, it contended. Perplexity compared the situation to a store that only allows customers to hire a personal shopper who works exclusively for the store, not a true personal shopper, but a sales associate.

    AI browsers pose risks that traditional browsers do not. “Traditional browsers don’t try to interpret a page or act on it,” explained Dan Pinto, CEO and co-founder of Fingerprint, a device intelligence and browser fingerprinting company, in Chicago.

    “With AI browsers, the AI assistant becomes part of the browsing experience,” he told TechNewsWorld. “This means it will interpret a page and act on cleverly hidden instructions because that’s what it was designed to do.”

    Traditional browsers render content while AI browsers interpret it, explained Dylan Dewdney, co-founder and CEO of Kuvi.ai, an embedded software products provider.

    “That interpretive layer is the threat multiplier,” he told TechNewsWorld. “A normal browser might load a malicious site, but an AI browser can be socially engineered, tricked, or linguistically coerced into taking actions on your behalf, including actions you didn’t authorize or even understand. It’s less like hacking a browser and more like hacking the assistant you delegated decision-making to.”

    More Dangerous Than Your Average Web Browser

    Pinto added that, in many cases, attacks launched via AI browsers are more harmful than those targeting traditional browsers.

    “The danger is that the AI assistant may take action on your behalf — such as clicking on malicious links, filling out forms, and sending valuable personal information — all without your knowledge,” he said. “Once an attacker can influence that automation, things escalate quickly, and the user may never see a single red flag.”

    Jon Knisley, head of process AI at Abbyy, a global intelligent automation company, maintained that it’s a one-two punch that makes AI browsers more dangerous than their conventional kin. “The autonomous nature of AI browsers and deeper integration with user resources expand their impact radius,” he told TechNewsWorld.

    “With access to user data across emails and documents, a successful attack can compromise an entire workflow compared to a local browser session,” he said. “Plus, agents lack the ‘common sense’ filter that can interrupt a more traditional social engineering or phishing attack.”

    Dewdney explained that AI-enabled browsing collapses the gap between reading and acting. “A malicious prompt doesn’t just show up on your screen. It can actually trigger actions, automate workflows, access accounts, or exfiltrate data,” he said. “Once an attacker hijacks the ‘interpretation layer,’ the blast radius is significantly larger. With human users, there’s friction. With agents, there’s speed and obedience.”

    Giving an agentic browser access to passwords, usernames, and other credentials also makes them potentially more dangerous to users, added Nick Muy, CISO of Scrut Automation, a cybersecurity and compliance automation company, headquartered in Milpitas, Calif. He cautioned users not to store usernames, passwords, and other credentials directly in a browser.

    “Require the browser to authenticate with a third-party app like 1Password,” he told TechNewsWorld. “Still, there’s a lot of risk with giving the browser access to anything.”

    One Click From Chaos

    Pinto noted that the online community is watching the first wave of attacks, shaped entirely around how AI assistants or agents see the web, not how humans do.

    “That means defenses have to adapt as well,” he said. “The more authorization AI assistants have to act on users’ behalf, the more important it becomes to have systems that can recognize when something about a device, a session, or a user’s behavior doesn’t make sense, not just if it’s a human or not.”

    “That extra layer of information,” he continued, “can help keep accounts protected without hindering this new way that legitimate users are interacting with the web.”

    “We’re entering an era where language is an attack vector,” added Dewdney.

    “Security models built for humans don’t map cleanly onto systems that reason, summarize, and act,” he explained. “The long-term solution will be a mix of cryptographic verifiability — attesting to the integrity of content — agent sandboxing and decentralized identity frameworks.”

    “Until then, users should treat AI browsers the way early internet users treated email attachments — powerful, convenient, and one careless click away from chaos,” he said.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Kavish
    • Website

    Related Posts

    The all-electric Jeep Recon is finally here

    November 19, 2025

    Best DS20 Mirage Loadout in COD Black Ops 7

    November 19, 2025

    Android 17 Reportedly Getting Big Gaming Boost With Native Controller Remapping

    November 19, 2025

    Tesla receives ride-hailing permit in Arizona in last required step to launch robotaxi service

    November 19, 2025

    How to Get Twitch Drops

    November 19, 2025

    AI data center provider Lambda raises whopping $1.5B after multibillion-dollar Microsoft deal 

    November 19, 2025

    Comments are closed.

    Top Reviews
    Editors Picks

    The all-electric Jeep Recon is finally here

    November 19, 2025

    Best DS20 Mirage Loadout in COD Black Ops 7

    November 19, 2025

    Android 17 Reportedly Getting Big Gaming Boost With Native Controller Remapping

    November 19, 2025

    Tesla receives ride-hailing permit in Arizona in last required step to launch robotaxi service

    November 19, 2025
    About Us
    About Us

    Email Us: info@xarkas.com

    Facebook Pinterest
    © 2025 . Designed by Xarkas Technologies.
    • Home
    • Mobiles
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.