Confusion Responds to Comet Browser Vulnerability Claims, Argues ‘Fake News’


  • SquareX accused Perplexity’s Comet browser of exposing a hidden MCP API that could enable local command execution
  • Confusion dismissed the claims as “completely false”, stressing that the API requires developer mode, user consent and manual page loading
  • SquareX countered, saying that Comet was quietly updated after its proof-of-concept and that outside researchers replicated the attack

Cybersecurity firm SquareX recently accused Perplexity of harboring a major vulnerability in its AI browser, Comet – the latter has now responded, saying the research report is “completely wrong” and part of a growing “false security research” problem.

SquareX had said it found a hidden API in the Comet browser capable of executing local commands. This API, called the MCP API, allows its embedded extensions to execute arbitrary local commands on users’ devices, features that traditional browsers explicitly prohibit.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top