Perplexity’s AI browser Comet is one of the pioneering “agentic” web browsers—blending browsing with AI agents to perform tasks like summarizing pages, managing emails, and automating workflows. Yet, security researchers at Brave have raised a red flag: Comet may be vulnerable to indirect prompt injection, a dangerous flaw that enables attackers to trick it into executing unintended actions, exposing highly sensitive user data. As AI-driven browsers surge in popularity, this challenge emerges at a critical moment—sharpening focus on the pressing need for robust web security in the age of intelligent automation.
What Went Wrong: How Comet’s Prompt Injection Vulnerability Works
Brave found that Comet fails to separate user commands from risky webpage content. When a user issues a prompt like “summarize this page,” the AI browser ingests the page’s content—and any malicious instructions hidden within it—treating all input as if it were user-initiated.
The technique—indirect prompt injection—allows attackers to embed commands in seemingly innocuous webpage elements (e.g., white text against white backgrounds, HTML comments, or Reddit posts). Comet’s AI may interpret these as valid instructions, potentially enabling actions such as extracting emails, OTPs, bank credentials, or even sending those details to a third party.
In one demonstration, Brave showed how Comet could expose a user’s one-time password and post it on Reddit—all without explicit user consent—to compromise the user’s account. Because Comet’s AI agent can operate with privileges across authenticated sessions, longstanding browser protections like same-origin policy or CORS are largely bypassed by Brave.
Broader Risks: AI Browsers and Real-World Threats
AI-powered browsers like Comet offer convenience by operating autonomously—but that autonomy introduces new attack surfaces. Traditional browsers rely on human judgment; AI browsers trust too much, too easily.
Security firm Guardio tested Comet by letting it shop for an Apple Watch on a fake Walmart site. Comet proceeded to autofill payment details and complete the purchase, often without any user prompt interrogations. In other tests, phishing emails containing malicious links were treated as to-do items—Comet clicked them and exposed credentials.
These examples illustrate how AI browsers can inherit AI’s over-trusting nature and expose users to significant privacy and financial risks.
Perplexity’s Response—and Why It May Not Be Enough
Perplexity quickly acknowledged the flaw: “The vulnerability is fixed. We worked directly with Brave to identify and repair the vulnerability,” said spokesperson Jesse Dwyer. However, subsequent testing by Brave and independent security researchers indicates the issue persists in some circumstances.
Though no real-world exploits have yet surfaced, the window of exploitability—weeks between initial discovery and full resolution—is worrisome and highlights the need for stronger safeguards.
Technical Breakdown: Why the Vulnerability Exists
- No instruction-origin separation: Comet merges user prompts and webpage content into a single AI input, leaving no parsing distinction.
- AI trusts text indiscriminately: Comet’s model lacks mechanisms to validate whether instructions came from the user or the page.
- Legacy browser protections fail: Policies like SOP and CORS don’t guard against semantic vulnerabilities like prompt injection.
- Leveraging privileged access: Because Comet operates with authenticated sessions, injected commands can access cookies, emails, and other sensitive data.
Societal and Security Implications
The Comet vulnerability highlights a growing challenge in AI-human teaming:
- 2025’s OWASP Top 10 for LLMs ranked prompt injection as the highest risk for LLM-integrated systems.
- Academic studies demonstrate how untrusted web content can hijack AI agents—leading to identity theft, data exfiltration, and full session hijacking.
- Designers must rebuild security architectures for agentic browsing—including input sanitization, executed task validation, permission isolation, and explicit user confirmation for sensitive actions.
Recommended Security Requirements for Agentic Browsers
Brave offers clear mitigations to counteract prompt injection and similar threats:
- Strictly separate user instructions from webpage content. Web content must remain untrusted.
- Validate agent outputs and alignment before executing any actions, especially those involving personal data.
- Require explicit user confirmation before executing sensitive actions, like banking or sending emails.
- Isolate agentic browsing modes from regular browsing; privileges should be minimal and transparent to users.
These measures echo broader AI security strategies such as “input sanitization,” “formal analyzers,” and “planner-executor isolation” as suggested by recent research.
Best Practices for Users Right Now
While waiting for updates, users should take caution:
- Avoid using Comet for sensitive tasks like banking or handling personal credentials until security is assured.
- Disable agentic summarization or auto actions on unfamiliar or untrusted sites.
- Monitor updates and release notes from Perplexity for verified fixes.
- Use manual verification before Comet performs any action.
Broader Sentiment and Future Directions
Comet’s vulnerability serves as a cautionary example: agentic AI tools must be designed with security baked in. Perplexity’s CEO has framed the browser as “AI’s killer app,” aiming to redefine productivity. But with that power comes responsibility—and early flaws must prompt comprehensive fixes, not just patches.
As academic research and real-world reports show, prompt injection is not hypothetical—it’s a real and persistent risk. Other AI-powered platforms have similarly suffered from semantic attacks, indicating a systemic design challenge across AI-integrated applications.
Conclusion
The discovery of prompt injection vulnerabilities in Perplexity’s Comet browser is a wake-up call. Agentic AI brings transformative capabilities but also introduces novel, high-stakes security threats. As browsers evolve into intelligent agents, they must be fortified with fundamentally new privacy architectures.
For now, users should tread cautiously. Security and AI convergence demands both innovation and vigilance—and Comet’s exposure underscores just how critical that balance truly is.
FAQs
What is the Comet browser?
Comet is Perplexity’s agentic AI-powered browser that integrates tasks like summarization and email handling directly into the web experience.
What is the vulnerability?
Comet processes webpage content without distinguishing it from user instructions, enabling indirect prompt injection that could compromise sensitive data.
Can my passwords or OTPs be stolen?
Yes—Brave demonstrated that hidden prompts could cause the AI to extract OTPs or account data and send them to attackers.
Has Perplexity fixed it?
They deployed an initial fix, but Brave’s testing suggests the issue still persists—indicating incomplete resolution.
What should users do?
Avoid using Comet for security-sensitive tasks until assurance of a robust fix. Prefer manual browsing for banking or private data. Monitor official updates.