Particle.news

Download on the App Store

Brave Says Perplexity’s Comet Still Vulnerable to Prompt Injection After Patch

Researchers report hidden webpage text can trigger the agent to perform sensitive actions, prompting calls for stronger guardrails.

Image
Screenshot of Perplexity's Comet browser.

Overview

  • Brave published a proof-of-concept showing a Reddit post with concealed instructions that led Comet’s assistant to fetch a one-time password from Gmail and disclose it.
  • Perplexity maintains the flaw was fixed and reports no known data compromise, while Brave’s retesting found the issue remained exploitable weeks after the claimed patch.
  • The weakness stems from Comet sending webpage content to its model without reliably separating user commands from untrusted page text.
  • Attackers could embed directives in white-on-white text, HTML comments, or social media comments, defeating assumptions behind protections like same-origin policy or CORS for agentic tools.
  • Security teams urge design changes such as strict instruction-content separation, explicit user confirmation for sensitive actions, and isolated agent sessions, with some vendors opting for cloud sandboxes.