Malware News PerplexedBrowser: Perplexity’s Agent Browser Can Leak Your PC's Local Files

Khushal

Level 14
Thread author
Verified
Top Poster
Well-known
Apr 4, 2024
697
4,125
1,269



Timeline
  • Oct 22, 2025: The Comet browser's ability to browse and exfiltrate user PC personal files via indirect prompt injection reported to Perplexity.
  • Nov 21, 2025: Bugcrowd changed the severity of the report to P1.
  • Dec 4, 2025: Perplexity reached out to acknowledge the vulnerability, reported they are actively implementing a fix, and we held a meeting to start our communication efforts.
  • Dec 17, 2025: Perplexity and Zenity held a meeting to discuss the vulnerability, relevant mitigations for patching, and set up a direct communication channel.
  • Jan 23, 2026: Perplexity issues a fix and asks Zenity to confirm it.
  • Jan 27, 2026: Zenity confirmed that the agent was unable to access or operate in the file:// path as used in the attack. However, Zenity identified a bypass to the patch that allowed file system traversal using the prefix view-source:file:///Users/ and reported it to Perplexity, who began working on a fix the same day. Zenity extends the public disclosure timeline from 90 to 120 days.
  • Feb 11, 2026: Perplexity issued an additional patch and asked Zenity to confirm it.
  • Feb 13, 2026: Zenity acknowledges the fix through internal testing, verifying a successful remediation.
 

Mini‑Guide: What We Learn from the PerplexedBrowser Case​

1. Always update your programs Security patches often arrive in waves. Installing the first one isn’t enough—check regularly for new versions.

2. Be cautious with experimental tools New browsers or apps can have serious flaws. When handling sensitive data, it’s safer to rely on well‑established tools.

3. Layered defenses Combine firewall, antivirus, and script/ad blockers. If one layer fails, another can stop the attack.

4. Watch out for “hidden tricks” This case was based on manipulating internal instructions. Remember: any software that interprets commands can be vulnerable.

5. Organize your digital habits Don’t store critical documents in folders accessible from experimental apps. Keep copies in secure, separate locations.
 
  • Like
Reactions: Brownie2019