Connect with us

Top Stories

Perplexity Faces Off Against SquareX Over Comet Browser Claims

editorial

Published

on

URGENT UPDATE: Perplexity has vehemently denied recent allegations from cybersecurity firm SquareX, which claims that its Comet browser harbors a critical vulnerability. The controversy centers around the alleged hidden MCP API that SquareX says could allow for unauthorized command execution on users’ devices.

In a statement released earlier today, Perplexity labeled SquareX’s claims as “entirely false” and part of a larger trend of “fake security research.” The company emphasized that the alleged vulnerability requires user consent, developer mode activation, and manual sideloading of any malicious software.

SquareX’s report, which has prompted significant media attention, asserts that the MCP API found within Comet could enable local command execution without proper restrictions. This API, according to SquareX, allows embedded extensions to execute arbitrary commands, a functionality traditional browsers do not support.

“This poses a serious risk if someone were to compromise the Perplexity site,” Kabilan Sakthivel, a researcher at SquareX, stated. The implications of such a breach could potentially expose users’ devices to significant threats.

In response, Perplexity spokesperson Jesse Dwyer stated,

“To replicate this, the human user must turn on developer mode and manually sideload malware into Comet.”

He further asserted that user consent is always required for local MCP access, countering SquareX’s claims about the hidden nature of the API.

Perplexity contended that the API’s use is transparent and user-driven, stating,

“When installing local MCPs, we require user consent—users are the ones setting it up and calling the MCP API.”

Dwyer criticized SquareX’s methodology, alleging that the firm did not follow standard security reporting protocols.

In a surprising twist, SquareX claims that Perplexity executed a “silent update” to Comet shortly after their proof-of-concept was revealed. The update reportedly disabled the local MCP functionality, validating SquareX’s concerns about the browser’s security. SquareX asserts that three external researchers were able to replicate the vulnerability, which Perplexity has now addressed.

“This is excellent news from a security perspective,” SquareX concluded, noting that their research has contributed to improving the safety of the AI browser. They expressed disappointment that Perplexity did not respond to their initial vulnerability disclosure submission.

As the situation develops, users of the Comet browser are urged to stay informed about any updates from Perplexity regarding security measures. The ongoing dispute highlights the critical need for transparency and accountability in cybersecurity practices.

Stay tuned for further updates on this pressing issue as both companies continue to navigate the fallout from these significant claims.

Continue Reading

Trending

Copyright © All rights reserved. This website offers general news and educational content for informational purposes only. While we strive for accuracy, we do not guarantee the completeness or reliability of the information provided. The content should not be considered professional advice of any kind. Readers are encouraged to verify facts and consult relevant experts when necessary. We are not responsible for any loss or inconvenience resulting from the use of the information on this site.