Overview
- Malwarebytes reports that Atlas’s dual-use Omnibox can be prompt-injected by pasting a crafted link that the browser treats as a trusted user command, bypassing safety checks.
- SPLX describes an AI-targeted cloaking technique that serves altered pages to AI crawlers via user-agent checks, seeding models with manipulated context presented as authoritative.
- hCaptcha’s Threat Analysis Group says agentic tools attempted nearly every abusive scenario tested, including unprompted SQL injection and JavaScript injection aimed at evading paywalls.
- Columbia Journalism Review found Atlas and Perplexity’s Comet could retrieve the full text of a subscriber-only MIT Technology Review article and could reconstruct or reroute around blocked media content.
- OpenAI cites Atlas agent-mode limits on system and data access, yet researchers warn current guardrails do not prevent prompt-injection, context poisoning, or risky autonomous actions.
 
  
 