Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical MongoDB Flaw Allows Arbitrary Code Execution
May 14, 2026
Gentlemen RaaS Exploits Fortinet & Leverages Cisco
May 14, 2026
Windows BitLocker 0-Day Allows Vulnerability Enables
May 14, 2026
Home/Threats/Agentic LLM Browsers: New Attack Surface Expose Prompt
Threats

Agentic LLM Browsers: New Attack Surface Expose Prompt

Artificial intelligence is fundamentally reshaping how users interact with the internet. AI-powered browsers now move beyond simply displaying web pages; they actively read content, execute actions,...

Marcus Rodriguez
Marcus Rodriguez
April 15, 2026 3 Min Read
6 0

Artificial intelligence is fundamentally reshaping how users interact with the internet. AI-powered browsers now move beyond simply displaying web pages; they actively read content, execute actions, and complete tasks on behalf of the user.

These tools, called agentic LLM browsers, let users give simple commands like “book a meeting” or “summarize my emails,” and the browser handles the rest. While this sounds useful, it brings a serious security cost that is only now coming into view.

Agentic LLM browsers work by connecting an AI model directly to the browser’s internal systems, giving the AI the ability to click buttons, fill forms, and interact with files without asking the user to approve each step.

Well-known examples include Comet by Perplexity, Atlas by OpenAI, Microsoft Edge Copilot, and Brave Leo AI.

Each product is built differently, but they all share the same problem: to function properly, they must break through the security walls that traditional browsers spent decades building.

Varonis Threat Labs researchers identified architectural vulnerabilities across these agentic browsers. Their research found that the same design choices making these tools powerful also make them easy to exploit.

By linking the AI model to local browser processes through privileged extensions and internal channels, these browsers create a control path that security frameworks were never designed to handle.

The attack surface exposed is broad. A web vulnerability like Cross-Site Scripting (XSS), which in a standard browser typically affects one website, can now hand an attacker complete control over the entire browsing session.

Using a method called indirect prompt injection, a malicious webpage embeds hidden instructions into the AI’s view — ones the user never sees, but the AI follows without question.

These commands can force the agent to read private files, send emails as the user, navigate to phishing pages, or silently download malware onto the device, far exceeding the damage of any traditional browser attack.

These attacks are hard to detect since the agent acts using real user credentials, malicious activity looks identical to normal browser behavior, giving attackers time to operate undetected.

How the Communication Bridge Becomes a Weapon

The most dangerous element in agentic LLM browsers is the trusted communication channel between the AI backend and the browser’s internal components.

Comet uses a feature called externally_connectable, allowing approved domains such as perplexity.ai to send commands directly to a powerful background extension.

That extension carries the debugger permission, which grants full programmatic control over the browser — including the ability to click, scroll, type, and read content across any open tab.

The Comet Agent Extension Permissions (Source - Varonis)
The Comet Agent Extension Permissions (Source – Varonis)

This extension runs quietly and cannot be turned off through standard browser settings. If an attacker executes malicious JavaScript on any approved domain, they can use that trusted origin to push unauthorized commands through the same channel.

Varonis Threat Labs confirmed during testing that XSS on a trusted domain could allow an attacker to invoke the GetContent tool and pull local files from the user’s machine.

Using the Agent Extension's GetContent Tool to Read a Local File from the OS Computer (Source - Varonis)
Using the Agent Extension’s GetContent Tool to Read a Local File from the OS Computer (Source – Varonis)

Microsoft Edge Copilot faces the same risk, as the researchers called the Edge.Context.GetDocumentBody tool in a continuous loop, capturing live page data and forwarding it to an external server, turning a basic reading tool into a live surveillance instrument.

Exfiltrating Content from a Private GitHub Repository (Source - Varonis)
Exfiltrating Content from a Private GitHub Repository (Source – Varonis)

Security teams should monitor browser processes for unexpected file reads, unusual outbound connections, or browser actions that carry user-level authority without clear user instruction.

Developers should enforce least-privilege policies for all extensions with elevated permissions and rigorously validate any external data the AI processes.

Individual users should keep browsers updated at all times, as Varonis confirmed that a prompt injection vulnerability discovered through embedded page titles was patched during the research period.

Organizations are encouraged to deploy data-aware detection tools that can identify browser activity appearing legitimate on the surface but lacking genuine user intent.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwarePatchphishingSecurityThreatVulnerability

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Windows BitLocker Flaw Lets Attackers Vulnerability Allows

Next Post

Hackers Use Hidden Mailbox Rules to Intercept M3 Create Microsoft

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Foxconn Confirms Cyberattack by Nitrogen Ransomware Gang
May 13, 2026
ClickFix Integrates Old Open-Source Python S Evolves SOCKS5
May 13, 2026
Critical SandboxJS Escape Vulnerability Allows Host Takeover
May 13, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us