By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Obscure MCP API in Comet Browser Breaches User Trust, Enabling Full Device Control via AI Browsers | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Obscure MCP API in Comet Browser Breaches User Trust, Enabling Full Device Control via AI Browsers | HackerNoon
Computing

Obscure MCP API in Comet Browser Breaches User Trust, Enabling Full Device Control via AI Browsers | HackerNoon

News Room
Last updated: 2025/11/19 at 8:08 PM
News Room Published 19 November 2025
Share
Obscure MCP API in Comet Browser Breaches User Trust, Enabling Full Device Control via AI Browsers | HackerNoon
SHARE

Palo Alto, California, November 19th, 2025/CyberNewsWire/–SquareX released critical research exposing a hidden API in Comet that allows extensions in the AI Browser to execute local commands and gain full control over users’ devices.

The research reveals that Comet has implemented a MCP API (chrome.perplexity.mcp.addStdioServer) that allows its embedded extensions to execute arbitrary local commands on users’ devices, capabilities that traditional browsers explicitly prohibit.

Concerningly, there is limited official documentation on the MCP API. Existing documentation only covers the intent of the feature, without disclosing that Comet’s embedded extensions have persistent access to the API and the ability to launch local apps arbitrarily without user permission, creating a massive breach of user trust and transparency.

“For decades, browser vendors have adhered to strict security controls that prevent browsers, and especially extensions, from directly controlling the underlying device,” explains Kabilan Sakthivel, Researcher at SquareX.

“Traditional browsers require native messaging APIs with explicit registry entries and user consent for any local system access. In their ambition to make the browser more powerful, Comet has bypassed all of these safeguards with a hidden API that most users don’t even know exists. This erosion of user trust fundamentally reverses the clock on decades of browser security principles established by vendors like Chrome, Safari, and Firefox.”

Currently, the API is found in the Agentic extension, and it can be triggered by the perplexity.ai page, creating a covert channel for Comet to access local data and launch arbitrary commands/apps without any user control. While there is no evidence that Perplexity is currently misusing the MCP API, the question is not if but when Perplexity will be compromised.

A single XSS vulnerability, a successful phishing attack against a Perplexity employee, or an insider threat would instantly grant attackers unprecedented control via the browser over every Comet user’s device. This creates catastrophic third-party risk where users have resigned their device security to Perplexity’s security posture, with no easy way to assess or mitigate the risk.

In SquareX’s attack demo, the research team used extension stomping to disguise a malicious extension as the embedded Analytics Extension by spoofing its extension ID.

Once sideloaded, the malicious Analytics Extension injects a script into the perplexity.ai page, which in turn invokes the Agentic Extension which finally uses the MCP to execute WannaCry on the victim’s device. While the demonstration leveraged extension stomping, other techniques such as XSS, MitM network attacks that exploits the perplexity.ai or the embedded extensions can also lead to the same result.

More worryingly, as both extensions are critical to Comet’s agentic functionality, Perplexity has hidden them from Comet extension dashboard, preventing users from disabling them even if they are compromised. These embedded extensions become a “hidden IT” that security teams nor users have zero visibility over. Furthermore, due to the lack of documentation, there is no way to know whether or when Comet might expand access to other “trusted” sites.

While other AI Browsers also have embedded extensions, we have only found the MCP API in Comet for now. We have disclosed the attack to Perplexity, but have not heard a response. 

Similar to the OS and search engine, owning the platform where the majority of modern work occurs has always been the grand ambition for many tech companies. With AI, there is now the opportunity to make browsers more powerful than ever before. Yet, in the race to win the next browser war, many AI Browser companies are shipping features so quickly that it has come at the cost of proper documentation and security measures. 

The MCP API exploits serve as an early warning to the third-party risks that poor implementation of AI Browsers can expose users to. “The early implementation of device control APIs in AI browsers is extremely dangerous,” Vivek Ramachandran, Founder of SquareX emphasizes. “We’re essentially seeing browser vendors grant themselves, and potentially third parties, the kind of system-level access that would require explicit user consent and security review in any traditional browser. Users deserve to know when software has this level of control over their devices.”

Without demand for accountability from users and the security community, other AI browsers will race to implement similar, or more invasive, capabilities to remain competitive. SquareX is calling on AI browser vendors to mandate disclosure for all APIs, undergo third-party security audits, and provide users with controls to disable embedded extensions.

This isn’t just about one API in one browser. If the industry doesn’t establish boundaries now, we’re setting a precedent where AI browsers can bypass decades of security principles under the banner of innovation. 

Demo Video: https://youtu.be/qJl4XllT-9M 

For more information, users can refer to the technical blog.

About SquareX

SquareX‘s browser extension turns any browser on any device into an enterprise-grade secure browser, including AI Browsers. SquareX’s industry-first Browser Detection and Response (BDR) solution empowers organizations to proactively defend against browser-native threats including rogue AI agents, Last Mile Reassembly Attacks, malicious extensions and identity attacks.

Unlike dedicated enterprise browsers, SquareX seamlessly integrates with users’ existing consumer browsers, delivering security without compromising user experience. Users can find out more about SquareX’s research-led innovation at www.sqrx.com.

Contact

Head of PR

Junice Liew

SquareX

[email protected]

:::tip
This story was published as a press release by Cybernewswire under HackerNoon’s Business Blogging Program. Do Your Own Research before making any financial decision.

:::

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Nvidia CEO Dismisses Concerns of an AI Bubble. Investors Remain Skeptical Nvidia CEO Dismisses Concerns of an AI Bubble. Investors Remain Skeptical
Next Article Gemini Can Now Tell You If An Image Was Made With AI – BGR Gemini Can Now Tell You If An Image Was Made With AI – BGR
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

An AI-Powered Workflow Automation Guide: How You Can Self-Host n8n with Docker Compose and Traefik | HackerNoon
An AI-Powered Workflow Automation Guide: How You Can Self-Host n8n with Docker Compose and Traefik | HackerNoon
Computing
iPhone 18 Pro Rumors Hint At 6 Major Upgrades In The Works – BGR
iPhone 18 Pro Rumors Hint At 6 Major Upgrades In The Works – BGR
News
Huawei Watch Ultimate 2 adds 30-meter underwater acoustic messaging · TechNode
Huawei Watch Ultimate 2 adds 30-meter underwater acoustic messaging · TechNode
Computing
Record-low deals: These Star Wars and Jack Skellington Echo Dot bundles are too cool!
Record-low deals: These Star Wars and Jack Skellington Echo Dot bundles are too cool!
News

You Might also Like

An AI-Powered Workflow Automation Guide: How You Can Self-Host n8n with Docker Compose and Traefik | HackerNoon
Computing

An AI-Powered Workflow Automation Guide: How You Can Self-Host n8n with Docker Compose and Traefik | HackerNoon

0 Min Read
Huawei Watch Ultimate 2 adds 30-meter underwater acoustic messaging · TechNode
Computing

Huawei Watch Ultimate 2 adds 30-meter underwater acoustic messaging · TechNode

1 Min Read
How to Add Text to Your TikTok Videos
Computing

How to Add Text to Your TikTok Videos

7 Min Read
Tapbit Marks 4th Anniversary With Continued Focus on Innovation And User Trust | HackerNoon
Computing

Tapbit Marks 4th Anniversary With Continued Focus on Innovation And User Trust | HackerNoon

5 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?