Since the introduction of LLM-powered agentic browsers, researchers at Varonis Threat Labs have shown that embedding autonomous AI agents in browsers creates new high-privilege attack surfaces that convert standard web flaws into full browser takeovers. The analysis highlights concrete abuse paths (XSS, agentic CSRF, IPC/Mojo bridge compromises, data-voids, and indirect prompt injection) across implementations such as Comet (Perplexity), OpenAI Atlas, Microsoft Edge Copilot, and Brave Leo. #Comet #OpenAI
Keypoints
- Agentic LLM browsers embed autonomous AI agents that can navigate, interact with pages, and execute multi-step workflows, creating a super-privileged control path distinct from traditional browser sandboxes.
- Different implementations (Comet/Perplexity, OpenAI Atlas, Edge Copilot, Brave Leo) use distinct architecturesâprivileged extensions, IPC/Mojo bridges, or native integrationsâeach with unique attack surfaces.
- Comet uses force-installed privileged extensions (service worker + content scripts) and chrome.runtime.sendMessage to bridge remote backends with Chrome DevTools Protocol (debugger permission), enabling full programmatic control of the browser.
- The primary attack vector is âagent-jackingâ: compromising a trusted/whitelisted origin (via XSS, DNS spoofing, subdomain takeover, or RCE) to send commands directly to the privileged agent and hijack browser authority.
- Specific abuses include unauthorized navigation, continuous page scraping for real-time spying, local file and internal network exfiltration (file:// URIs, SSRF), silent downloads of malware, impersonation (unauthorized emails/transactions), and data-void manipulation.
- Mitigations such as Cometâs local_search_enabled flag and origin allow-lists reduce risk, but IPC design, force-installed extensions, and agent toolsets create systemic paradoxes where functionality requires crossing long-standing security boundaries.
- New logic-targeting attacksâindirect prompt injection via page content and system prompt extractionâthreaten the agentâs decision layer and enable attackers to manipulate or disclose core agent instructions.
MITRE Techniques
- [T1190 ] Cross-Site Scripting (XSS) â Used to gain execution on trusted/whitelisted domains and send commands to privileged agent bridges; quote: âA standard vulnerability like XSS can now escalate from merely stealing a cookie toâŻfully hijacking the agent itself.â
- [T1190 ] Remote Code Execution / Exploit Public-Facing Application â Exploiting vulnerabilities on authorized domains (RCE or other exploits) to commandeer IPC/Mojo channels and control the OWL host or extension; quote: âAny vulnerability that allows an adversary to impersonate or control a trusted domain including DNS spoofing, subdomain takeovers, or Remote Code Execution (RCE) serves as a master key to the browserâs high-privilege bridge.â
- [T1005 ] Data from Local System â Agentic tools can be tricked to navigate to local file URIs and read disk content (local file exfiltration); quote: ânavigating to a local file URI (e.g., file:///C:/passwords.txt)⌠these tools could retrieve raw data from disk.â
- [T1041 ] Exfiltration Over C2 Channel (Web exfiltration) â Compromised agents can continuously capture page content or send stolen data to attacker-controlled servers; quote: âcapture that content and exfiltrate it to the attackerâs server.â
- [T1566 ] Phishing / Impersonation â Agent-driven impersonation and unauthorized actions (sending emails or performing transactions) by poisoning the agent context; quote: âImpersonation: Launching the agent with a âpoisonedâ context to perform financial transactions or send emails on the userâs behalf.â
- [T1198 ] Cross-Site Request Forgery (agentic CSRF) â URL- or referrer-based triggers (q= parameters) can be used to attempt unauthorized agent actions, prompting defenses like Cometâs local_search_enabled; quote: âthis can introduce a CSRF-like risk⌠Comet treats this as an âagentic CSRFâ scenario.â
- [T1530 ] Subdomain Takeover / DNS Spoofing (Domain Takeover) â Domain ownership or DNS manipulation that lets attackers control whitelisted origins and thus the agent bridge; quote: âAn attacker who gains execution on a domain like perplexity.ai, openai.com, or copilot.microsoft.com can bypass the LLMâs reasoning layer entirely.â
Indicators of Compromise
- [Domain ] trusted/whitelisted backends and UIs â perplexity.ai, copilot.microsoft.com (used as privileged origins that can send commands to extensions/hosts)
- [Internal/Browser URLs ] privileged internal pages and debug interfaces â edge://discover-chat-v2, chrome://serviceworker-internals, brave://leo-ai (expose internal extension/tooling and IPC surfaces)
- [File URI ] local file access attempts â file:///C:/passwords.txt (example used to demonstrate local file exfiltration capability)
- [Search/URL parameters ] agentic CSRF vectors â https://www.perplexity.ai/search/new?q=⌠(q= parameter example that can be used to inject agent prompts)
- [Repository/Content ] sensitive content sources targeted for exfiltration â private GitHub repository (used in simulations to demonstrate live content capture and exfiltration)
Read more: https://www.varonis.com/blog/architectural-vulnerabilities-in-agentic-llm-browsers