Vulnerability in Perplexity Comet

Until last month, an attacker could have stolen local files from anyone using Perplexity's Comet browser by exploiting a security flaw. The attack was surprisingly simple: it only required sending the victim a calendar invite.

Vulnerability Details

The AI-powered Comet browser exposed users' local files to potential theft. The vulnerability resided in the browser's file management, which left them accessible through a simple calendar invite. This scenario highlights the importance of rigorous security, especially in applications that handle sensitive data.

For those evaluating on-premise deployment of similar solutions, there are significant trade-offs between control and complexity. AI-RADAR offers analytical frameworks at /llm-onpremise to evaluate these aspects.