Zenity Details Perplexity AI Browser Vulnerability
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户已经提供了文章的详细内容,我得先通读一遍,抓住主要信息。 这篇文章讲的是Zenity公司发现Comet AI浏览器的一个漏洞,叫做PerplexedComet。这个漏洞允许攻击者在不点击的情况下控制内容,触发自主行为。攻击者通过嵌入日历内容中的间接提示注入,让Comet访问本地文件系统,读取敏感文件,并将内容传送到外部网站。 漏洞在去年十月被报告,Perplexity公司已经加强了边界设置来修复问题。但作者指出,这类攻击不需要用户交互,一旦AI浏览器接受任务框架,就会自动执行。因此,防止这类攻击的关键是设置严格的权限边界。 此外,文章还提到AI浏览器和代理的采用速度超过了网络安全团队制定政策的速度,普通用户对潜在风险缺乏认识。未来可能会有更多网络安全事件发生。 现在我要把这些信息浓缩到100字以内。重点包括:Zenity发现漏洞、零点击攻击、访问敏感文件、修复措施、权限边界的重要性以及AI安全挑战。 可能的结构是:Zenity发现Comet AI浏览器漏洞PerplexedComet,允许零点击攻击控制内容;攻击者通过日历嵌入间接提示注入,访问文件系统并传输出去;虽然已修复但类似攻击仍可能;需严格权限边界;AI安全挑战加剧。 检查字数是否合适,并确保涵盖关键点。 </think> Zenity发现Comet AI浏览器存在零点击漏洞PerplexedComet,可利用日历嵌入恶意代码控制文件访问并传输出去。该漏洞已修复但类似风险仍存,需严格权限管理应对AI安全挑战。 2026-3-3 14:27:45 Author: securityboulevard.com(查看原文) 阅读量:10 收藏

Zenity, a provider of a platform for securing artificial intelligence (AI) applications and agents, today detailed how a zero-click attack could be launched against the Comet AI browser developed by Perplexity.

Company CTO Michael Bargury said the attack vector, dubbed PerplexedComet, enables a malicious attacker to control content in a way that can be used to trigger autonomous behavior across connected tools and workflows.

Part of a family of PleaseFix vulnerabilities found in AI browsers, PerplexedComet was used to send a benign calendar. Once the user asks Comet to accept the meeting, the rest of the flow executes without further interaction. Via an indirect prompt injection embedded in trusted calendar content, Comet is manipulated to access the local file system, browse directories, open sensitive files, and read their contents. The agent then exfiltrates the file contents to an external attacker-controlled website.

The PerplexedComet vulnerability was reported to Perplexity last October, with a stricter set of boundaries implemented in the Comet browser last month to improve cybersecurity, preventing this specific attack.

However, these types of indirect prompt injection attacks can be used to exploit a variety of AI agent execution models that create trust boundaries as tools are invoked across an integrated workflow, said Bargury.

The challenge is these types of attacks require no exploit, no user clicks, and no explicit request to compromise a workflow, he added. Instead, once an AI browser accepts the framing of the task, access to files and data are provided with detection only occurring too late to thwart or not at all, noted Bargury. For example, in one instance, the PerplexedComet vulnerability was used to access data that Comet issued a warning about after the data had already been transmitted. In another, running fully in the background, no alert was shared at all.

The only way to effectively prevent those issues is to ensure that a set of hard boundaries have been put in place that prevent AI browsers and agents from gaining access to tools and services without a specific permission being granted, he added.

Unfortunately, AI browsers and agents are being adopted faster than most cybersecurity teams can define policies. Cybersecurity teams need to review how AI browsers and agents are configured to limit certain capabilities, said Bargury. That’s critical because most end users still lack an appreciation for the potential risks that, for example, an indirect prompt injection attack that is trivial to set up actually represents, he noted.

It’s not clear if there will be several major cybersecurity incidents before organizations fully appreciate the inherent risks associated with adopting AI agents or browsers, or whether a proverbial death by thousands of cuts will eventually force a reckoning. The one thing that is certain is that with the rise of AI agents and browsers, achieving and maintaining cybersecurity is only likely to be even more challenging in an era where every resource can now be instantly accessed.

Recent Articles By Author


文章来源: https://securityboulevard.com/2026/03/zenity-details-perplexity-ai-browser-vulnerability/
如有侵权请联系:admin#unsafe.sh