Perplexity Responds to Comet Browser Vulnerability Claims, Argues ‘Fake News’



  • SquareX accused Perplexity’s Comet browser of exposing a hidden MCP API that could allow local command execution
  • Perplexity rejected the claims as “completely false” and emphasized that the API requires developer mode, user consent, and manual download.
  • SquareX responded by saying that Comet was quietly updated after its proof of concept and that third-party researchers replicated the attack.

Cybersecurity company SquareX recently accused Perplexity of maintaining a major vulnerability in its AI browser, Comet; the latter has now responded, saying the research report is “completely false” and part of a growing problem of “fake security research.”

SquareX had said that it found a hidden API in the Comet browser, capable of executing local commands. That API, called the MCP API, allows its built-in extensions to execute arbitrary local commands on users’ devices, capabilities that traditional browsers explicitly prohibit.



Leave a Comment

Your email address will not be published. Required fields are marked *