- Pro
- Security
SquareX says it found a 'hidden API' in the Comet browser
Comments (0) ()When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.
OpenVPN-protokollet - därför är det så bra
(Image credit: Shutterstock)
- SquareX discovered hidden MCP API in Comet browser enabling arbitrary local command execution
- Vulnerability in Agentic extension could let attackers hijack devices via compromised perplexity.ai site
- Demo showed WannaCry execution; researchers warn catastrophic third‑party risk is inevitable
Cybersecurity experts at SquareX claims to have found a major vulnerability in Comet, the AI browser built by Perplexity, which could let threat actors take over the victim’s device, entirely.
SquareX found the browser has a hidden API capable of executing local commands (commands on the underlying operating system, as opposed to just the browser).
- Amazon Black Friday deals are live: here are our picks!
That API, which the researchers named as MCP API (chrome.perplexity.mcp.addStdioServer), appears to be a custom implementation of a more general “Model Context Protocol”, and “allows its embedded extensions to execute arbitrary local commands on users’ devices, capabilities that traditional browsers explicitly prohibit.”
You may like-
OpenAI's shiny new Atlas browser might have some serious security shortcomings - and it's not the only one under threat from dangerous spoof attacks
-
OpenAI's new Atlas browser may have some extremely concerning security issues, experts warn - here's what we know
-
1Password and Perplexity partner on Comet AI browser - a full time personal assistant with security by default
Just a matter of time
For Kabilan Sakthivel, Researcher at SquareX, not adhering to strict security controls the industry evolved to, “reverses the clock on decades of browser security principles established by vendors like Chrome, Safari and Firefox.”
SquareX says it found the API in the Agentic extension, which can be triggered by the perplexity.ai page. That means, should anyone break into the Perplexity site, they will have access to devices of all of its users.
For the researchers, this is not a question of ‘if’, but rather - ‘when’.
“A single XSS vulnerability, a successful phishing attack against a Perplexity employee, or an insider threat would instantly grant attackers unprecedented control via the browser over every Comet user's device,” their report notes.
Are you a pro? Subscribe to our newsletterContact me with news and offers from other Future brandsReceive email from us on behalf of our trusted partners or sponsorsBy submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.“This creates catastrophic third-party risk where users have resigned their device security to Perplexity's security posture, with no easy way to assess or mitigate the risk.”
SquareX also showed a demo in which the researchers spoofed a legitimate extension, sideloaded it into the browser, and through it injected a script into the perplexity.ai page. This invoked the Agentic extension which, ultimately, used MCP to execute WannaCry.
“While the demonstration leveraged extension stomping, other techniques such as XSS, MitM network attacks that exploit the perplexity.ai or the embedded extensions can also lead to the same result.”
We have reached out to Perplexity about these findings and will update the article when we hear back.
The best antivirus for all budgetsOur top picks, based on real-world testing and comparisons➡️ Read our full guide to the best antivirus1. Best overall:Bitdefender Total Security2. Best for families:Norton 360 with LifeLock3. Best for mobile:McAfee Mobile Security
Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!
And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.
Sead FadilpašićSocial Links NavigationSead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.
Logout Read more
OpenAI's shiny new Atlas browser might have some serious security shortcomings - and it's not the only one under threat from dangerous spoof attacks
OpenAI's new Atlas browser may have some extremely concerning security issues, experts warn - here's what we know
1Password and Perplexity partner on Comet AI browser - a full time personal assistant with security by default
Experts warn Gladinet file sharing tool flaw prompts dangerous cyberattacks - and there's no patch
Researchers reveal passkeys may not be as safe as we think they are - here's how to stay safe
Malicious AI-made extension with ransomware capabilities sneaks on to Microsoft's official VS Code marketplace - so devs beware
Latest in Security
Gaming and gambling giant IGT reportedly hit by ransomware - here's what we know
China’s PlushDaemon group uses EdgeStepper implant to infect network devices with SlowStepper malware in global supply-chain attacks
WordPress plugin with over a million installs may have a worrying security flaw - here's what we know
Fortinet admits it found another worrying zero-day being exploited in attacks
Trump administration wants to use federal power to challenge state AI laws
The EU wants to make some major changes to GDPR - could big tech be getting its way at last?
Latest in News
Android and iPhones call a truce – Quick Share now works with Apple's AirDrop
Twitch introduces facial age scans in the UK despite privacy concerns
How to watch 7Plus from anywhere – get the Ashes 25/26 livestream
How to listen to BBC 6 Music outside the UK
Microsoft flexes on Copilot's coding skills and an anti-AI barrage ensues
Nano Banana Pro is a massive leap in image editing powered by Gemini 3 Pro
LATEST ARTICLES- 1This $1 VPN just dropped a 90% off deal for Black Friday - here's how to grab yours
- 2Pluribus episode 4 introduces us to a mysterious new character – and I think they're key to solving the Apple TV show's big riddle
- 3What is the release date for Landman season 2 episode 2 on Paramount+?
- 4Another bulletproof hosting service has been locked down by global law forces
- 5I’ve spent nearly 50 hours barely surviving in Stalker 2: Heart of Chornobyl, and its PS5 release is the most fun I've had trying not to die in a post-apocalyptic open-world