Serious vulnerabilities found in OpenAI’s newly released Atlas browser Serious vulnerabilities found in OpenAI’s newly released Atlas browser

A browser is something we use multiple times a day, making it a perfect touchpoint for technology companies seeking world domination — or at least aiming to get ahead of the competition. The modalities of this program, whose list of applications continues to grow seemingly without end, imply the submission of all kinds of data through it. This makes profiling customers — and we are all customers to big tech — an easy task. These profiles are then used to target ads, which is the most benign way such data can be exploited.

Thus, it is unsurprising that companies like Google built their own browsers. Nor is it surprising that the current leaders of the AI race want to add such a product to their portfolios. There are already around a dozen AI-driven browsers, or those claiming to be, from Perplexity’s Comet and Dia to Opera Neon (stay tuned; we’ll publish an overview article about AI-based browsers soon).

On October 21, 2025, OpenAI joined the race with Atlas. So far, only a macOS version is available to the public. The browser is explicitly “agentic” — capable of performing meaningful actions on behalf of the user — which, as it turns out, is both a blessing and a curse.

Key vulnerabilities in OpenAI’s Atlas (as of October 2025)

Prompt injection attacks. Like other AI-based browsers, ChatGPT Atlas is vulnerable to indirect prompt injection attacks. These involve malicious instructions hidden inside a webpage or embedded text. The prompts are designed to make the AI agent perform actions beneficial to wrongdoers, from sharing sensitive information to causing financial loss in one way or another.

Clipboard injection exploit. This is particularly interesting: the AI can be manipulated into copying a link to the clipboard, which the user may later paste into the browser’s address bar. Needless to say, the link leads to a phishing site.

UI redressing and full-screen spoofing (CVE-2025-7021). This vulnerability has already received a CVE (Common Vulnerabilities and Exposures) number. The browser may fail to correctly handle the fullscreen API and UI rendering, making it unable to detect when a site overlays phishing content. Its controls may also fail to respond to spoofing.

A deeper issue lies in the browser’s core design: real-time integration with OpenAI’s large language model means Atlas sends at least some data to the company’s servers, which requires certain internal memory that could be accessed or exploited.

The situation is evolving; stay tuned for further reporting and guidelines on how to mitigate the inherent flaws in AI-based browsers.

Author's other posts

Asking AI for news might not be a good idea, study finds
Article
Asking AI for news might not be a good idea, study finds
The habit of asking AI to scoop up the news might set in quickly, but it's not the healthiest one as the model can distort the information, a study finds.
Spotlight: Flyoobe, a Windows 11 installation customization tool
Article
Spotlight: Flyoobe, a Windows 11 installation customization tool
Flyoobe is, arguably, one of the most popular Windows 11 installation customization tools out there. Learn what it can do, and how (everything's simple).
Is Affinity for iPad free now? It would seem so
Article
Is Affinity for iPad free now? It would seem so
For whatever reason, Affinity graphic suite for iPad is now free. Most likely, the situation will change by the end of the month, so grab it now.
Google introduces Recovery contacts, a way to claim back an account
Article
Google introduces Recovery contacts, a way to claim back an account
Google added one more account recovery method to the two already known. Learn how to set up the Recovery contact.