Perplexity responds to Comet browser vulnerability claims, denounces “fake news”


  • SquareX accused Perplexity’s Comet browser of exposing a hidden MCP API that could allow local command execution
  • Perplexity dismissed these claims as “entirely false”, pointing out that the API requires developer mode, user consent and manual loading.
  • SquareX hit back, saying Comet was silently updated after its proof of concept and that external researchers replicated the attack.

Cybersecurity firm SquareX recently accused Perplexity of retaining a major vulnerability in its AI browser, Comet – the latter has now responded, saying the research report was “entirely false” and part of a growing problem of “fake security research”.

SquareX had said it had found a hidden API in the Comet browser, capable of executing local commands. This API, named MCP API, allows its built-in extensions to execute arbitrary local commands on users’ devices, capabilities that traditional browsers explicitly prohibit.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top