Gartner® named Zenity the COMPANY TO BEAT in AI Agent Governance 🏁

Understanding Browser Agent Security Risks in the Enterprise

Portrait of Dina Durutlic
Dina Durutlic
Cover Image

Key Takeaways:

  • Browser agent security risk is different from general AI risk because browser agents inherit one of the most trusted and densely connected surfaces in the enterprise: the browser itself.
  • The biggest risks emerge when browser agents combine untrusted web content, authenticated sessions, local context, extensions, and action-taking into a single execution path.
  • Governance is still immature in many organizations. Most enterprises don’t yet have clear ownership, runtime monitoring, or policy boundaries for browser-based autonomy.
  • Reducing browser agent security risk requires more than browser hardening. Enterprises need controls around identity, tool use, workflow boundaries, and runtime behavior.
  • The organizations that will use browser agents safely are the ones that treat them as enterprise execution infrastructure, not as lightweight productivity features.

Browser agent security risk is becoming one of the most important new questions in enterprise AI.

Long before AI agents arrived, the browser had already become the place where enterprise work happens. It’s where people log into business systems, review sensitive data, approve requests, move money, reset credentials, manage tickets, and coordinate with customers. The browser won that role because it became the easiest way to deliver software at scale.

Browsers were built around the assumption that a person would stay in the loop.

A human would notice when something looked strange, hesitate before clicking, question an unexpected prompt, or stop before moving sensitive data from one place to another. An AI browser agent changes that model.

It doesn’t just view the browser. It reads pages, interprets content, navigates applications, and increasingly takes actions across tabs, systems, and workflows. We know that browser agents are useful. But enterprises need to understand that by utilizing browser agents, they’re introducing a new attack surface into their organization. Enterprises need to understand browser agents not as a novelty feature, but as a new operational layer sitting on top of existing trust, access, and workflow dependencies.

What is an Agentic Browser?

An agentic browser is a browser environment that includes an AI system capable of understanding what it sees and taking action based on that context. Instead of functioning only as a passive viewer, the browser becomes an active execution surface for automation, decision-making, and workflow completion.

How an AI browser agent differs from traditional browser automation

Traditional browser automation isn’t new. Scripts and testing tools have long been able to click buttons, fill fields, and move through predefined paths. The difference with an AI browser agent is flexibility and autonomy.

A browser agent can:

  • interpret natural language instructions
  • adapt to page changes
  • summarize content
  • shift goals as conditions change
  • continue operating without a rigid script

That makes browser agents more useful for real business work, but it also makes them less predictable than classical automation. A traditional workflow script does what it was explicitly told to do. An agentic browser reasons about what to do next.

Why browser agents matter now

Browser agents are gaining traction because so much enterprise work already lives in the browser. CRM platforms, HR systems, support tools, finance applications, identity providers, admin consoles, and customer records all sit behind browser sessions.

The browser becomes an obvious place to deploy autonomous help. Organizations don’t need to rebuild every workflow from scratch if a browser using an AI agent can navigate the same systems an employee already uses.

Stanford’s 2025 AI Index notes that language model agents have already outperformed humans in some programming tasks under limited time budgets, which helps explain why enterprise interest in delegated AI workflows is accelerating.

That’s part of why the market is moving quickly toward products like the Perplexity Comet agentic browser and the Dia agentic browser. The browser has become one of the fastest ways to insert agentic AI into real enterprise workflows.

How Do Agentic Browsers Work?

An agentic browser typically combines four layers: perception, reasoning, execution, and memory.

The perception layer helps the system inspect the page, read content, and identify visible interface elements. The reasoning layer interprets the task and decides what should happen next. The execution layer clicks, types, submits, downloads, or navigates. The memory layer helps the system carry context across steps, tabs, or sessions.

That sounds straightforward until those layers begin touching real enterprise workflows, authenticated sessions, local files, extensions, and browser-connected tools.

The typical execution loop for a browser agent

A browser agent usually works through a repeating loop:

  • observe the current page or interface
  • interpret the user’s goal
  • decide the next action
  • execute in the browser
  • evaluate the result
  • continue until the task is complete or blocked

That loop is what makes browser agents powerful. It’s also what makes them risky. Untrusted content can influence behavior midstream, and that influence may carry into the next step even after the original page or prompt is gone.

Common use cases for an agentic browser

A browser agent can be helpful in many common enterprise scenarios, including:

  • summarizing research across multiple tabs
  • filling repetitive web forms
  • moving through scheduling or procurement workflows
  • collecting data from admin dashboards
  • triaging support or CRM tasks
  • assisting with browser-based operational work

These are exactly the use cases that make the category attractive. A browser using an AI agent can save time where browser work is repetitive, fragmented, and manually expensive. But the same access that makes it useful also expands the blast radius when something goes wrong.

6 Common Browser Agent Security Risks

The most important browser agent security risks usually don’t come from one dramatic exploit. They emerge because normal browser trust assumptions can stop working once autonomy is introduced. Enterprises need to understand not just what browser agents can do when everything works as intended, but what happens when content is untrusted, context is manipulated, or a workflow continues further than anyone expected.

Prompt injection through normal web content

One of the clearest browser agent security risks is that normal page content can become instructions for the agent. A browser agent may appear to be reading a support ticket, calendar invite, document, webpage, or message preview. In reality, that content may contain attacker-controlled instructions that influence what the agent does next.

This is what makes indirect prompt injection especially dangerous in the browser. The browser does not need to be “hacked” in the traditional sense. The agent can simply be persuaded to do the wrong thing inside its approved capability model. That is a major reason the glaring security risks with AI browser agents deserve much more attention than they are getting today.

Zenity Labs demonstrated this precisely in research on Perplexity Comet. In that attack, a weaponized calendar invitation containing hidden instructions was all it took. Once the user asked Comet to accept the meeting, the agent read the malicious content embedded in the invite description, treated it as legitimate task input, accessed the local file system, located sensitive files, and exfiltrated their contents to an attacker-controlled server, all without a single additional click from the user.

Sensitive data exposure from local context and authenticated sessions

A browser agent often operates in one of the richest possible enterprise contexts: open tabs, saved sessions, downloaded files, browser history, local paths, and authenticated access to critical applications.

That makes a browser agent powerful, but it also makes the environment unusually sensitive. Data exposure may no longer require an explicit upload or copy-paste event. A browser agent can expose information simply by reading the wrong page, carrying the wrong context across tabs, or navigating through an authenticated workflow it was never meant to complete.

Tool and extension chaining across the browser

Browser agents rarely act alone. They may interact with extensions, downloads, side panels, helper tools, local handlers, or connected services. Each added capability expands what the browser agent can do, but it also expands the risk.

The problem is often not one tool in isolation. It is the chain. A browser agent may open a page, extract content, switch tabs, pull information from another system, and post the result somewhere else. Each step may seem acceptable on its own. Together, they can produce an unsafe outcome that no single permission was designed to prevent.

Zenity Labs documented a real-world example of this in research on Comet’s integration with the 1Password browser extension. Using the same calendar invite injection technique, the agent was steered into the user’s unlocked 1Password session, where it navigated the vault, located and revealed stored credentials, and transmitted them to an attacker-controlled endpoint, all through ordinary browser navigation. The same chain extended to a full account takeover: changing the account password and extracting the Secret Key and recovery material.

Credential misuse and identity confusion

Browser agents often operate within user identity context. That means they may act with the same access the user already has.

This creates a subtle but serious risk. The issue is not always credential theft in the classic sense. It may be credential misuse through delegated execution. The browser agent is acting as the user, but without the same judgment, hesitation, or situational awareness a person would apply manually.

In practice, that can lead to approvals, edits, submissions, or disclosures that the user never consciously intended, even though the actions occurred inside an authenticated session.

Password managers make this risk concrete. When a browser agent operates inside an unlocked password manager session, it doesn’t need to steal credentials in the traditional sense. It’s already authenticated. It can navigate to vault entries, reveal stored secrets, and transmit them outward using nothing more than ordinary page loads, because from the browser’s perspective, that is all that is happening. The agent isn’t breaking rules. It’s following them, on behalf of someone else.

Memory and context contamination

Many browser agents rely on context continuity to remain useful. They remember task goals, prior instructions, recent actions, relevant pages, and workflow state.

That persistence helps them stay productive, but it also creates a path for contamination. If malicious or irrelevant content enters memory, the browser agent may reuse it later in a new context where it no longer belongs. A stale assumption, poisoned instruction, or embedded webpage command can influence behavior long after the original source has disappeared from view.

This is one of the more underappreciated agentic browser security risks because it often appears as drift over time rather than one obvious bad action.

Silent or background execution risk

Some of the most serious risks are the ones that don’t appear dramatic while they happen. A browser agent may open a message, extract details, switch tabs, check a system, open a file, and complete the next step in a workflow. Each action may appear routine. The danger is that the agent can move through the sequence faster than a human can meaningfully review it.

That is why the risk from accepting a meeting invite is such a powerful example. The issue is not just that a meeting request looks harmless. The deeper problem is that the browser agent may treat that invitation as trusted workflow input and continue automatically into sensitive actions involving local files, authenticated applications, or browser-connected resources.

For enterprises, this changes the question. The issue is no longer only whether the user clicked something dangerous. It’s whether the browser agent was allowed to move from untrusted content into sensitive action without enough visibility, friction, or review.

The Zenity Labs research on Comet makes this concrete: in one execution path, Comet issued a warning only after the data had already been transmitted. In another, running entirely in the background, no warning appeared at all. The user saw normal output. The attacker received the data. That is the operational reality of silent execution risk.

Governance Gaps for Agentic Browsers

Most enterprises still don’t have a mature governance model for browser agents. That is the real problem.

Traditional browser governance was designed for human behavior. It includes things like extension policies, access management, DLP, SSO, endpoint protection, and download restrictions. Those controls still matter, but they weren’t built for a browser agent that can interpret content, reason through tasks, and act across workflows.

That means governance has to change.

Common governance gaps include:

  • no inventory of which browser agents are in use
  • no policy for when browser automation is allowed
  • unclear ownership between security, IT, and business teams
  • no workflow-level review of high-risk browser tasks
  • weak monitoring of browser agent behavior at runtime
  • no escalation standard for unsafe browser agent actions

This is where organizations begin to feel the difference between experimenting with agentic AI and actually governing it. A browser agent may look lightweight because it lives in the browser. In practice, it can become one of the fastest paths into sensitive execution if governance remains shallow.

Best Practices for Securing Browser Agents

The most practical way to reduce browser agent security risk is to accept that browser agents are not lightweight helpers. They are execution systems operating in one of the most sensitive enterprise surfaces.

Start with inventory and ownership

Before anything else, teams need to know which browser agents are deployed, who owns them, what workflows they touch, and what systems they can access. Shadow adoption is a major part of browser agent risk because unsanctioned usage tends to grow faster than policy.

Limit what the browser agent can see and do

The safest browser agent is not the most powerful one. It’s the one with the narrowest effective permissions. Limit access to local files, sensitive applications, high-risk admin flows, credential stores, and unnecessary tabs or domains wherever possible.

Break high-risk action chains

Don’t let a browser agent move from reading to acting without controls. High-impact steps should require approvals, checkpoints, or stronger runtime policy boundaries. If the browser agent can cross too many trust boundaries in one session, the blast radius becomes too large.

Monitor behavior in runtime

Browser agent security risk is not solved by configuration review alone. Teams need visibility into what browser agents actually do in context: pages accessed, actions attempted, unusual navigation, suspicious chaining, and risky transitions between trusted and untrusted content.

This is one reason more organizations are looking for ways to secure agentic browsers with runtime visibility rather than relying only on browser hardening.

Treat browser agents as a governance issue, not just a browser issue

The right control model usually spans security, IT, identity, compliance, and business workflow owners. A browser agent that handles research is not the same as one that accepts meetings, edits records, opens files, or moves through internal admin flows. Governance should reflect those differences explicitly.

The market is moving quickly, and not every product has the same execution model or risk profile. Still, several names are becoming important reference points in the broader browser agent conversation.

Perplexity Comet agentic browser

Perplexity Comet is an AI-first agentic browser built by Perplexity that has drawn attention because it represents a more autonomous model of browser interaction. A user may ask it to inspect content, extract details, move across tabs, and carry out follow-up browser actions as part of one task flow. That is exactly what makes the Perplexity Comet agentic browser a useful case study in enterprise risk. The phrase Perplexity Comet agentic browser has become a useful shorthand for this more autonomous browser model, one where users delegate research, form-filling, scheduling, and multi-step workflows to an embedded AI agent rather than completing each step manually.

Zenity Labs has published two pieces of original security research on Comet that illustrate the real-world exposure this execution model introduces. The first showed how a zero-click calendar invite could be used to exfiltrate local files from a user’s machine through indirect prompt injection. The second escalated that same technique to a full 1Password vault takeover, including credential exfiltration and account password rotation, without any additional user interaction. Both findings were responsibly disclosed, and Perplexity and 1Password collaborated on mitigations. The research is a useful reference for any enterprise evaluating agentic browser risk in practice.

ChatGPT Atlas

ChatGPT Atlas is OpenAI's agentic browser, launched in October 2025, which places ChatGPT directly inside every browsing session. A user can ask it to navigate sites, summarize pages, fill forms, manage emails, or complete multi-step research tasks without leaving the tab they are working in. What makes Atlas particularly significant for enterprise risk is the scale of its adoption: security firm Cyberhaven found that 27.7% of enterprises already have at least one employee using it. OpenAI has also publicly acknowledged that prompt injection in Atlas "expands the security threat surface" and is unlikely to ever be fully solved.

Dia agentic browser

The Dia agentic browser, built by The Browser Company (now a subsidiary of Atlassian), reflects the same broader trend toward integrated, assistive, browser-native workflows. It could help compare information across tabs, summarize findings, and tee up the next step in a workflow. That is valuable, but it also means the browser becomes part of the execution layer rather than just the display layer.

Opera Neon

Opera Neon is an agentic browser from Opera that launched in late 2025 as a subscription product built specifically for users who delegate heavily to AI. Its "Neon Do" function operates directly inside the user's authenticated browser session, navigating pages, filling forms, and moving through workflows without requiring the user to share passwords with a cloud service. The enterprise risk angle sharpens further with Opera Neon's MCP Connector, launched in early 2026, which allows external AI clients, including Claude, ChatGPT, and others, to connect directly to a live Neon session and take action inside it. That means the browser's authenticated context is not just available to the built-in agent, but potentially to any connected AI system the user has authorized.

An important note about browser agents

Not every AI browser agent is marketed as an “agentic browser.” Some show up as browser assistants, embedded automation, or research copilots inside browser-based workspaces. The label matters less than the behavior. If the system can observe the page, reason about the task, and take action through the browser, it belongs in the same security and governance conversation.

Securing browser agent risk

Browser agent security risk matters because the browser was already one of the most trusted and deeply connected layers in the enterprise before autonomy arrived. Browser agents don’t create that concentration of trust. They inherit it.

That makes browser agents more than just another AI tool category. They introduce autonomous action into workflows where sessions are authenticated, files are accessible, and meaningful business actions can happen in only a few steps.

The organizations that respond well will not be the ones that ban every browser agent by default. They will be the ones who understand what an agentic browser is, recognize where control breaks down, and put governance and runtime protections in place before adoption outpaces visibility.

Book a demo to see how Zenity can help your team govern agentic AI safely.

All Academy Posts

Secure Your Agents

We’d love to chat with you about how your team can secure and govern AI Agents everywhere.

Get a Demo