Perplexity’s Comet AI Browser Is Vulnerable to Prompt Injections, Says Brave

A study by Brave browser claims that screenshots captured by the AI assistant could contain malicious instructions.

Advertisement
Written by Akash Dutta, Edited by Ketan Pratap | Updated: 22 October 2025 17:02 IST
Highlights
  • Comet browser allows users to take screenshots of web pages
  • It then allows users to ask questions about the screenshots
  • Attackers can use various techniques to hide the malicious instructions

Brave claims that attackers can get a free hold of the AI browser tools for malicious usage

Photo Credit: Perplexity

Perplexity's Comet browser and other artificial intelligence (AI)-powered browsers might be vulnerable to prompt injections, claimed a new study. This study, which was conducted by Brave, claims that they were able to embed malicious instructions into a website and share it with the AI assistant of the browser via screenshots. The study also demonstrates such an attack, which is said to allow hackers to control the AI's browser tools for malicious purposes. It is not known whether OpenAI's ChatGPT Atlas is also vulnerable to such techniques.

AI Browsers Could Be Vulnerable to Prompt Injections

Prompt injections are not a new phenomenon. Ever since the arrival of AI chatbots that operate on the natural language interface, bad actors have been trying to find ways to generate harmful and misleading outputs by hiding malicious instructions in documents, images, and even plain text. These attacks rely on multi-layered instructions and long-chain commands to break the internal safeguards of AI systems.

In the latest study by Brave, which was conducted by the company's Senior Mobile Security Engineer, Artem Chaikin, explored whether the AI assistant of the Comet browser can be tricked into following such malicious instructions. However, delivering the message to the AI assistant is more difficult than a chatbot since the bad actor does not directly control the interface.

Advertisement

In the first experiment, malicious instructions were embedded in the web content using hidden text (these can be text written in background colours, zero-font text, text placed outside the margin, etc). While the user cannot see this text, the AI can process and analyse it. If the user takes a screenshot of the webpage to ask the assistant a query, Comet's text recognition extracts the instructions and automatically begins following them.

In the demonstration, the prompt injection successfully rerouted the webpage to the user's Gmail account and was able to extract sensitive emails and send them to the attacker.

While this is one plausible way to attack a user, it still relies on the victim taking a screenshot of the web page, which is not an efficient method. The researchers also demonstrated a far nefarious method which works whenever a user navigates to the target website.

Advertisement

Here, the researcher embedded malicious visible instructions on the website. But the text is added to the page in a way that most people would not take notice (in this case, it was added as prompt suggestions on an AI chatbot page). If the user asks the AI assistant to visit the website, the browser is said to process the malicious instructions, which are designed to override the user's query and instead start a chain of action. In this case, the instructions were able to take the browser to a social media page and follow the account.

In the study, Brave said that browsers with agentic capabilities can be prompt-injected by a random webpage's content, creating a high risk for users who share the passwords of different websites and even credit card information with the browser. These authenticated privileges are then used against the user.

Advertisement

“This lets simple natural-language instructions on websites (or even just a Reddit comment) trigger cross-domain actions that reach banks, healthcare provider sites, corporate systems, email hosts, and cloud storage,” stated the study.

Notably, Brave said that it had reported the prompt injection vulnerability to Perplexity on October 1 and shared a public disclosure notice the following day.

 

Catch the latest from the Consumer Electronics Show on Gadgets 360, at our CES 2026 hub.

Advertisement

Related Stories

Popular Mobile Brands
  1. Here's How Much the Motorola Signature Could Cost in India
  2. Redmi Note 15 Pro Series 5G India Launch Gets Delayed
  3. Oppo Reno 15 FS 5G Launched With 6,500mAh Battery, Snapdragon 6 Gen 1 SoC
  4. iPhone 18 Pro Series Expected to Debut With Dynamic Island, Tipster Claims
  5. Xbox Cloud Gaming to Get Free Access 'This Year' With Ads
  6. Realme 15T Review
  7. Ram Charan's Peddi OTT Release Confirmed: What You Need to Know
  1. Shambala Now Streaming Online: What You Need to Know About Aadi Saikumar Starrer Movie
  2. Deepinder Goyal to Step Down as Eternal CEO; Blinkit’s Albinder Dhindsa Named Successor
  3. Microsoft CEO Satya Nadella Says AI’s Real Test Is Whether It Reaches Beyond Big Tech: Report
  4. Meta's New AI Team Delivered First Key Models Internally This Month, CTO Says
  5. Apple Pay Reportedly Likely to Launch in India Soon; iPhone Maker Said to Be in Talks With Card Networks
  6. Netflix Will Now Pay All Cash for Warner Bros. to Keep Paramount at Bay
  7. Xbox Game Pass Wave 2 Lineup for January Announced: Death Stranding Director's Cut, Space Marine 2 and More
  8. Best Laser Printers with Scanners That You Can Buy in India Right Now
  9. Samsung Sound Tower 2026 Lineup Launched in India With Up to 18 Hours of Playback, 240W Output: Price, Features
  10. iPhone 18 Pro, iPhone 18 Pro Max to Feature Centre-Aligned Selfie Camera Housed Inside Smaller Dynamic Island, Tipster Claims
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.