OpenAI’s Atlas browser leaves the door wide open to prompt injection
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解其主要内容。 文章主要讲的是OpenAI的Atlas浏览器存在安全漏洞。这个漏洞出现在 Omnibox 搜索栏,攻击者可以利用它将恶意链接注入,绕过安全检查,执行恶意指令。这可能导致用户的隐私和数据安全受到威胁。 接下来,我需要提炼关键点:Atlas浏览器、Omnibox漏洞、恶意链接注入、安全检查绕过、隐私和数据风险。然后用简洁的语言把这些点串联起来,确保不超过100字。 可能会遇到的问题是如何准确表达技术细节而不超出字数限制。需要选择最核心的信息,避免冗余。例如,“攻击者可以将恶意链接注入”比详细描述技术手段更简洁。 最后,检查总结是否涵盖了所有关键点,并且语言流畅自然。 </think> OpenAI的Atlas浏览器因Omnibox功能存在安全漏洞,攻击者可利用恶意链接绕过安全检查,执行潜在危险指令。此问题凸显AI浏览器在隐私和数据安全方面的风险。 2025-10-29 13:48:6 Author: www.malwarebytes.com(查看原文) 阅读量:10 收藏

Atlas browser

It seems that with every new agentic browser we discover yet another way to abuse one.

OpenAI recently introduced a ChatGPT based AI browser called Atlas. It didn’t take researchers long to find that the combined search and prompt bar—called the Omnibox—can be exploited.

By pasting a specially crafted link into the Omnibox, attackers can trick Atlas into treating the entire input as a trusted user prompt instead of a URL. That bypasses many safety checks and allows injected instructions to be run with elevated trust.

Artificial Intelligence (AI) browsers are gaining traction, which means we may need to start worrying about the potential dangers of something called “prompt injection.” We’ve discussed the dangers of prompt injection before, but the bottom line is simple: when you give your browser the power to act on your behalf, you also give criminals the chance to abuse that trust.

As researchers at Brave noted:

“AI-powered browsers that can take actions on your behalf are powerful yet extremely risky. If you’re signed into sensitive accounts like your bank or your email provider in your browser, simply summarizing a {specially fabricated} Reddit post could result in an attacker being able to steal money or your private data.”

Axios reports that Atlas’s dual-purpose Omnibox opens fresh privacy and security risks for users. That’s the downside of combining too much functionality without strong guardrails. But when new features take priority over user security and privacy, those guardrails get overlooked.

Despite researchers demonstrating vulnerabilities, OpenAI claims to have implemented protections to prevent any real dangers. According to its help page:

“Agent mode runs also operates under boundaries:

System access: Cannot run code in the browser, download files, or install extensions.

Data access: Cannot access other apps on your computer or your file system, read or write ChatGPT memories, access saved passwords, or use autofill data.

Browsing activity: Pages ChatGPT visits in agent mode are not added to your browsing history.”

Agentic AI browsers like OpenAI’s Atlas face a fundamental security challenge: separating real user intent from injected, potentially malicious instructions. They often fail because they interpret any instructions they find as user prompts. Without stricter input validation and more robust boundaries, these tools remain highly vulnerable to prompt injection attacks—with potentially severe consequences for privacy and data security.


We don’t just report on privacy—we offer you the option to use it.

Privacy risks should never spread beyond a headline. Keep your online privacy yours by using Malwarebytes Privacy VPN.


文章来源: https://www.malwarebytes.com/blog/news/2025/10/openais-atlas-browser-leaves-the-door-wide-open-to-prompt-injection
如有侵权请联系:admin#unsafe.sh