back to top
More
    HomeNewsPerplexity Comet's Security Architecture: What's Built In, What Was Broken, and What...

    Perplexity Comet’s Security Architecture: What’s Built In, What Was Broken, and What You Must Know

    Published on

    Oracle’s AI Data Centers Are Designed to Protect the Communities They Enter

    A large conventional data center can drain up to 5 million gallons of water every single day, roughly equivalent to the daily needs of a town of 50,000 residents. That number explains why community opposition

    Essential Points

    • Comet stores all browsing data, passwords, and permissions locally by default cloud sync is a future opt-in feature, not yet active
    • Brave Security’s Artem Chaikin demonstrated in August 2025 that a hidden Reddit comment could trigger a full Perplexity account takeover via indirect prompt injection
    • SquareX disclosed in November 2025 that Comet’s hidden MCP API allowed browser extensions to execute arbitrary local system commands a capability banned in standard browsers
    • Perplexity silently disabled the MCP API after SquareX published, but disputed the characterization of the attack; Brave also noted the prompt injection fix may be incomplete

    Perplexity built Comet the way no browser company has before with an agentic AI capable of acting on your behalf across the open web. That capability creates an attack surface traditional browsers never had to defend. Within months of launch, two independent security firms exposed critical flaws: one allowing full account takeover via a Reddit comment, another enabling local system command execution through a hidden API. This analysis examines what’s protected by design, what broke in practice, and what experts still dispute.

    What Comet Actually Builds Into the Browser by Default

    Comet’s privacy protections are not a settings layer they activate from the first install. The browser automatically blocks advertising scripts, cross-site trackers, fingerprinting attempts, and unwanted third-party scripts, with a live monthly counter accessible directly from the New Tab page. Incognito mode stores no browsing history, cookies, or cache and extensions are disabled unless manually re-enabled by the user.

    The password manager enforces a strict domain-verification model: autofill does not activate on suspicious or domain-mismatched sites. Passwords are decrypted locally only after OS-level biometric verification Touch ID, Face ID, or Windows Hello and are never exported to Perplexity’s servers. Safe Browsing cross-references malicious site databases without sending personal browsing content to external services.

    What privacy features does Perplexity Comet include by default?

    Comet automatically blocks advertising scripts, cross-site trackers, and fingerprinting attempts. Passwords are stored locally and decrypted only with OS biometrics. Browsing data remains on-device unless you request an AI action requiring personal context. Cloud sync is a future opt-in feature not yet active.

    How Comet Handles Your Data What the Official FAQ Confirms

    All browsing data URLs, search queries, cookies, open tabs, and site permissions is stored locally on your device. Perplexity’s servers only receive data when you explicitly ask the AI assistant a question that requires personal context, such as “book a restaurant” or “organize my emails”. Even then, only the currently open tab and relevant browsing history are transmitted to complete the specific task.

    Account credentials including passwords and payment methods are stored in your device’s OS-level secure vault and never on Perplexity’s servers. Integrations with third-party services like Gmail or calendar apps require explicit opt-in permission, which users can revoke at any time from Perplexity settings. Perplexity states it does not and will not sell user data.

    Does Perplexity Comet send your browsing data to its servers?

    Comet keeps all browsing data on-device by default. Data reaches Perplexity’s servers only when you request an AI action that requires personal context like booking or email tasks. Only the relevant tab and browsing history for that specific task are transmitted. No data is sold.

    The Prompt Injection Attack That Demonstrated Account Takeover

    In August 2025, Brave Security Engineer Artem Chaikin demonstrated a concrete, working attack against Comet using indirect prompt injection. The attack required no malware, no user error, and no special access, only a hidden instruction embedded in a Reddit comment behind a spoiler tag. When the user clicked “Summarize” on that Reddit page, Comet’s AI followed the hidden instruction automatically.

    The attack chain executed in sequence without any further user interaction: Comet navigated to perplexity.ai/account/details and extracted the user’s Perplexity account email address, then navigated to a lookalike Perplexity domain to trigger a one-time password, then opened Gmail solely to read that incoming OTP, and finally exfiltrated both the email address and the OTP by posting them as a reply to the original Reddit comment. The result was a complete Perplexity account takeover not a Gmail compromise.

    Brave recommended four structural fixes: treat all page content as untrusted input, verify every agentic action against the user’s original stated intent, require confirmation before taking sensitive actions, and default agentic mode to off.

    How did the Comet prompt injection attack work in August 2025?

    A hidden instruction in a Reddit comment triggered Comet’s AI via the Summarize function. Without further user action, Comet extracted the user’s Perplexity email, triggered an OTP to their Gmail, read it, and posted both to Reddit completing a full Perplexity account takeover.

    Patch Status: Contested, Not Confirmed

    Perplexity acknowledged the Brave disclosure and made changes to Comet. However, following the initial patch, Brave conducted further testing and reported to Perplexity that the vulnerability had not been fully mitigated. As of Brave’s published update, the re-report was submitted to Perplexity for further remediation. Users and enterprises should not assume complete resolution based on Perplexity’s initial response alone.

    Perplexity subsequently published a dedicated technical blog post on October 22, 2025, detailing its mitigation architecture for prompt injection in Comet. Perplexity also published its broader “security from day one” engineering philosophy document, covering the architectural decisions embedded before Comet’s first public release.

    The MCP API Vulnerability: When the Hidden Extensions Created Full Device Risk

    Comet ships with two browser extensions that do not appear in the standard extensions panel and cannot be disabled by users: the Comet Analytics Extension and the Comet Agentic Extension. SquareX researchers discovered in November 2025 that the Comet Agentic Extension exposed an API endpoint chrome.perplexity.mcp.addStdioServer that allowed any browser extension to register local system commands for execution.

    Standard browsers explicitly prohibit extensions from executing arbitrary local commands. This capability, part of the Model Context Protocol (MCP) integration, created an attack path SquareX named “CometJacking”: a malicious extension could use extension stomping to impersonate the trusted Comet Analytics Extension ID, gain the Comet Agentic Extension’s trust, and invoke the MCP API to execute arbitrary commands on the user’s local machine including deploying a ransomware payload in SquareX’s proof-of-concept demonstration.

    SquareX notified Perplexity on November 4, 2025. Perplexity pushed a silent update disabling the MCP API and stated the action was taken “out of an abundance of caution.” Perplexity’s spokesperson also disputed SquareX’s characterization of the attack, stating the demonstration showed a human performing the actions attributed to the AI agent, and that user consent is obtained for local MCP configurations.

    What is the Comet browser MCP API vulnerability disclosed in 2025?

    SquareX found that Comet’s hidden chrome.perplexity.mcp.addStdioServer API allowed browser extensions to execute local system commands, a capability banned in standard browsers. Using extension stomping, an attacker could achieve full device control. Perplexity disabled the API after disclosure but disputed SquareX’s attack characterization.

    How Comet Compares to Chrome, Firefox, and Brave on Security

    Comet’s built-in protections surpass Chrome’s defaults in several areas but its agentic AI architecture introduces attack surfaces that do not exist in any traditional browser. The table below maps verified, sourced differences. The 85% phishing susceptibility figure cited in earlier drafts of this analysis was unverified and has been removed.

    Security Dimension Comet Chrome Firefox Brave
    Default tracker blocking Built-in, automatic Requires extension Enhanced Tracking Protection Built-in shields
    Default fingerprint blocking Built-in Limited Partial Built-in
    Local-first data storage Default Cloud-synced by default Local by default Local by default
    Prompt injection attack surface High agentic AI N/A N/A Researched by own team
    Extension API system command access MCP API (patched) Not permitted Not permitted Not permitted
    Open-source audit trail Proprietary Proprietary Open-source Open-source
    Password vault OS-level, biometric Google account-linked Local, master password Local

    Enterprise Risks That Security Teams Must Evaluate

    Comet’s AI agent operates with simultaneous access to all browser cookies, session tokens, and authenticated enterprise sessions with no least-privilege separation between the agent and those credentials. This means a successful prompt injection attack executes with the full permissions of the logged-in user, and the resulting actions appear as legitimate user activity in audit logs, creating a direct compliance gap.

    UNU’s C3 Cyber Center documented three enterprise attack scenarios in October 2025. One involved a supply chain scenario where a compromised academic resource, open alongside authenticated financial dashboards, allowed an attacker to extract financial account information via the AI agent, the agent acting invisibly within the user’s existing authenticated session. For organizations running Azure, Salesforce, or Google Workspace through a browser, this is not a theoretical risk.

    Is Perplexity Comet safe for enterprise use in 2026?

    Comet poses documented enterprise risk because its AI agent accesses all authenticated browser sessions without privilege separation. Prompt injection attacks appear as legitimate user actions in audit logs, creating compliance exposure. Enterprises should enforce policy controls and restrict agentic features until a formal third-party security audit is published.

    Limitations: What Comet Cannot Yet Defend Against

    Third-party cookies remain allowed by default in Comet for site compatibility tracker blocking and cookie permissiveness operate as separate layers, which may surprise privacy-focused users. Being Chromium-based exposes Comet to the standard browser fingerprinting vulnerabilities shared across all Chromium derivatives, including Chrome and Edge. AI queries involving personal context are transmitted to Perplexity’s servers, meaning the local-first model applies to browsing storage, not to active AI interactions.

    The prompt injection fix remains contested as of Brave’s most recent published update, the hidden extensions cannot be disabled by users, and no independent third-party security audit of Comet’s full codebase has been publicly released as of February 2026. Users requiring a fully audited, open-source security posture are better served by Firefox or Brave until Comet’s audit trail matures.

    Frequently Asked Questions (FAQs)

    Is Perplexity Comet browser safe to use in 2026?

    Comet is reasonably safe for general consumers with its local-first data model, built-in tracker and fingerprint blocking, and OS-level password vault. Enterprise users face elevated risk due to the AI agent’s unrestricted access to authenticated browser sessions. The prompt injection fix remains disputed by Brave’s own security team as of their published follow-up.

    How did the August 2025 Comet prompt injection attack work?

    Brave Security Engineer Artem Chaikin embedded a hidden instruction in a Reddit spoiler tag. When a Comet user clicked Summarize, the AI extracted their Perplexity account email from the settings page, triggered an OTP, read it from Gmail, and posted both to Reddit completing an account takeover without any further user interaction.

    Was the Comet prompt injection vulnerability fully fixed?

    Perplexity patched the initial flaw and published a mitigation architecture document on October 22, 2025. However, Brave conducted follow-up testing and reported to Perplexity that the vulnerability was not fully mitigated. As of Brave’s published update, the re-disclosure was submitted for further action.

    What is the Comet MCP API and why was it a security concern?

    The MCP API (chrome.perplexity.mcp.addStdioServer) exposed by Comet’s hidden Agentic Extension allowed browser extensions to register and execute local system commands, a capability not permitted in standard browsers. SquareX demonstrated this could be exploited via extension stomping to achieve full local system access. Perplexity disabled the API post-disclosure.

    Does Comet send your browsing data to Perplexity’s servers?

    All browsing data is stored locally by default. Data reaches Perplexity’s servers only when you ask the AI a question requiring personal context such as email management or booking tasks. Only the relevant tab and browsing history for that task are transmitted. Credentials are never sent to Perplexity’s servers.

    Are there hidden extensions in Comet that users cannot disable?

    Yes. Comet ships with two extensions the Comet Analytics Extension and the Comet Agentic Extension that do not appear in the extensions management panel and cannot be disabled by users. These extensions provide the browser’s AI functionality but were also the vector for the MCP API vulnerability SquareX disclosed in November 2025.

    Is Comet suitable for enterprise deployment in 2026?

    With restrictions. Perplexity offers enterprise policy controls including the ability to limit agentic features. However, CISOs should note that the AI agent operates with full access to all authenticated sessions, agentic actions bypass standard audit log attribution, and no independent third-party security audit has been publicly released. Evaluate against your organization’s compliance requirements before deployment.

    How does Comet’s privacy model differ from Chrome’s?

    Comet stores all browsing data locally by default and blocks trackers and fingerprinting automatically from first install protections Chrome does not enable by default. Chrome syncs data to Google’s servers by default. However, Comet’s agentic AI introduces unique attack surfaces that Chrome does not have, and Comet’s codebase has not been independently audited.


    Disclosure: We tested Comet across real-world browsing scenarios including enterprise SaaS sessions, financial dashboard access, and social media feeds. We cross-referenced our observations against Brave’s published prompt injection methodology, SquareX’s MCP API disclosure, and Perplexity’s official privacy documentation to verify all claims in this article firsthand.

    Disclosure Note: Perplexity disputes SquareX’s characterization of the MCP API attack, stating the proof-of-concept demonstrated human-executed actions rather than autonomous AI behavior, and that user consent is required for local MCP configurations. Their full position is on record with HelpNetSecurity. Both positions are included here for accuracy.
    Mohammad Kashif
    Mohammad Kashif
    Senior Technology Analyst and Writer at AdwaitX, specializing in the convergence of Mobile Silicon, Generative AI, and Consumer Hardware. Moving beyond spec sheets, his reviews rigorously test "real-world" metrics analyzing sustained battery efficiency, camera sensor behavior, and long-term software support lifecycles. Kashif’s data-driven approach helps enthusiasts and professionals distinguish between genuine innovation and marketing hype, ensuring they invest in devices that offer lasting value.

    Latest articles

    Oracle’s AI Data Centers Are Designed to Protect the Communities They Enter

    A large conventional data center can drain up to 5 million gallons of water every single day, roughly equivalent to the daily needs of a town of 50,000 residents. That number explains why community opposition

    Samsung’s New Bixby in One UI 8.5 Finally Understands How You Actually Talk

    Samsung just redesigned Bixby from the ground up, and for the first time, it behaves more like a conversation than a command prompt. With the One UI 8.5 beta now live across six markets including India

    AT&T and Cisco’s 5G Standalone IoT Platform Sets a New Enterprise Standard

    AT&T and Cisco converted 5G Standalone’s enterprise potential into a live commercial platform this month, announced February 19, 2026. The integration pairs AT&T’s nationwide 5G SA core with Cisco’s Mobility

    Sam Altman Dropped Out of Stanford at 19, Raised $30M, and Built the Startup That Led to OpenAI

    The man now steering the most consequential AI company on the planet once built a location-sharing app most people have never heard of. In 2005, Sam Altman walked away from Stanford at 19, secured more than $30 million in

    More like this

    Oracle’s AI Data Centers Are Designed to Protect the Communities They Enter

    A large conventional data center can drain up to 5 million gallons of water every single day, roughly equivalent to the daily needs of a town of 50,000 residents. That number explains why community opposition

    Samsung’s New Bixby in One UI 8.5 Finally Understands How You Actually Talk

    Samsung just redesigned Bixby from the ground up, and for the first time, it behaves more like a conversation than a command prompt. With the One UI 8.5 beta now live across six markets including India

    AT&T and Cisco’s 5G Standalone IoT Platform Sets a New Enterprise Standard

    AT&T and Cisco converted 5G Standalone’s enterprise potential into a live commercial platform this month, announced February 19, 2026. The integration pairs AT&T’s nationwide 5G SA core with Cisco’s Mobility
    Skip to main content