Perplexity’s Comet AI browser may have some concerning security flaws which could let hacker hijack your device

  • SquareX discovered hidden MCP API in Comet browser enabling arbitrary local command execution
  • Vulnerability in Agentic extension could let attackers hijack devices via compromised perplexity.ai site
  • Demo showed WannaCry execution; researchers warn catastrophic third‑party risk is inevitable

Cybersecurity experts at SquareX claims to have found a major vulnerability in Comet, the AI browser built by Perplexity, which could let threat actors take over the victim’s device, entirely.

SquareX found the browser has a hidden API capable of executing local commands (commands on the underlying operating system, as opposed to just the browser).

That API, which the researchers named as MCP API (chrome.perplexity.mcp.addStdioServer), appears to be a custom implementation of a more general “Model Context Protocol”, and “allows its embedded extensions to execute arbitrary local commands on users’ devices, capabilities that traditional browsers explicitly prohibit.”

Just a matter of time

For Kabilan Sakthivel, Researcher at SquareX, not adhering to strict security controls the industry evolved to, “reverses the clock on decades of browser security principles established by vendors like Chrome, Safari and Firefox.”

SquareX says it found the API in the Agentic extension, which can be triggered by the perplexity.ai page. That means, should anyone break into the Perplexity site, they will have access to devices of all of its users.

For the researchers, this is not a question of ‘if’, but rather – ‘when’.

“A single XSS vulnerability, a successful phishing attack against a Perplexity employee, or an insider threat would instantly grant attackers unprecedented control via the browser over every Comet user’s device,” their report notes.

“This creates catastrophic third-party risk where users have resigned their device security to Perplexity’s security posture, with no easy way to assess or mitigate the risk.”

SquareX also showed a demo in which the researchers spoofed a legitimate extension, sideloaded it into the browser, and through it injected a script into the perplexity.ai page. This invoked the Agentic extension which, ultimately, used MCP to execute WannaCry.

“While the demonstration leveraged extension stomping, other techniques such as XSS, MitM network attacks that exploit the perplexity.ai or the embedded extensions can also lead to the same result.”

We have reached out to Perplexity about these findings and will update the article when we hear back.

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

Read more @ TechRadar

Latest posts

Dreame’s new robovac has the most advanced mop setup I’ve seen, and the jukebox-style mop dispenser is just the start of it

Dreame has been pushing boundaries in the robot vacuum space for a while now. One of its robvacs has tiny little feet that launch...

Google, Amazon, and xAI want to launch AI into space

Google, Amazon, and xAI are racing to build space-based AI systems.The orbiting networks could reduce latency and power strain on Earth.Having AI overhead could...

Windscribe rolls out new tools to let you manage your VPN IP address your way

Windscribe adds IP Pinning and IP Rotation for easier IP controlUsers can lock to a preferred IP or switch to a fresh oneThey will...

Intel drops plans to sell networking and communication division

Intel confirms plans to keep its NEX business in-houseThe company was looking for buyers in July 2025NEX is key to its AI, data center,...

Get the Samsung Galaxy Tab S11 Ultra for as little as $399.99 when you trade in your old tablet

Samsung's Cyber Week sale is still live with offers on TVs, tablets, phones, and more. And even though Black Friday is over, you can...

Pluribus episode 6 features the wildest cameo I’ve seen in 2025, and nobody realized it was foreshadowed weeks ago

Pluribus episode 6 is out now on Apple TV – and, amid its various talking points, viewers have expressed shock and delight over what...

This new anonymous phone carrier doesn’t even need your name – here are 5 things you should know about it

Phreeli is something we haven’t seen before – it’s a mobile carrier that’s so anonymous you don’t even need to give it your name....

Upgrade your gaming audio with the stylish SteelSeries Arctis Gamebuds – now $50 off

If you're after a gaming audio solution that boasts all the power of a headset in a much more convenient, portable format than look...

SACD is back, baby! This beefy new audiophile CD player is deliciously ’90s, and has built-in tube amplification as a bonus

The Shanling SCD3.3 is an SACD player with 24-bit R2R DAC and dual tubesUpsampling chip and MQA CD compatibility$3,990 (about £3,000 / AU$6,055)Shanling is...

Windows 11’s Run prompt is getting a makeover and a handy extra power – but already there are worries Microsoft will ruin it

Windows 11's Run box is seemingly getting refreshedThe new-look prompt was found hidden in a Windows 11 test buildAs well as a visual makeover,...