Morning Overview

Web browsers are quietly turning into AI agents that click and type for you — and security experts warn they can be tricked into handing over your logins

Imagine visiting a perfectly normal-looking website while your browser’s AI assistant fills out a form on your behalf. Somewhere in the page’s code, invisible to you, a single line of text tells that assistant to copy your stored login credentials and send them to an external server. You never see a prompt. You never click “confirm.” The agent just does it.

That scenario is no longer hypothetical. A research paper published on arXiv in June 2025, titled “Mind the Web: The Security of Web Use Agents,” systematically tested how easily popular AI-powered web agents can be hijacked by hidden instructions planted on ordinary web pages. The results were stark: across multiple agents and attack types, the researchers demonstrated that malicious content embedded in a site’s HTML could commandeer an agent into leaking sensitive data, altering form submissions, or locking users out of workflows entirely.

The findings arrive at a moment when the gap between what these tools can do and what users understand about them is widening fast. Browser-integrated AI agents from major tech companies are moving from experimental previews toward mainstream releases, and millions of people may soon rely on software that treats every web page it visits as a set of potential instructions.

How the attack works

A traditional browser is passive. It renders text, images, and interactive elements, then waits for a human to decide what to do. An AI web agent is fundamentally different: it reads page content, interprets it, and takes action. That interpretation step is the vulnerability.

The researchers crafted attack payloads using a technique the security community calls “indirect prompt injection.” An attacker embeds directives inside a page’s HTML, CSS, or even visible text styled to be unreadable to humans (white text on a white background, for instance). A person browsing the page sees nothing unusual. But the agent, which processes the full text content of the page as part of its reasoning, treats those directives as legitimate instructions.

The paper organized its attacks around the CIA triad, a standard security framework covering confidentiality, integrity, and availability:

  • Confidentiality attacks tricked agents into extracting credentials or personal data and transmitting them to attacker-controlled endpoints.
  • Integrity attacks caused agents to silently alter form data before submission, such as changing a payment recipient or modifying an order.
  • Availability attacks disrupted the agent’s ability to complete tasks at all, effectively creating a denial-of-service condition for the user.

What makes this different from phishing is the removal of the human checkpoint. Phishing depends on fooling a person into clicking a link or entering a password. These agent-targeted attacks skip that step. The AI reads the page, follows the hidden instruction, and acts before the user has any chance to evaluate the request. The speed and autonomy that make agents useful are exactly the properties that make them exploitable.

Which agents are at risk

The paper tested multiple popular web-use agents, though the rapidly shifting landscape of these tools means the specific products evaluated represent a snapshot rather than a complete census. The broader category includes standalone agent platforms like OpenAI’s Operator and Anthropic’s computer use capability, browser extensions such as MultiOn, and emerging native integrations like Google’s Project Mariner and Microsoft’s Copilot-powered features in Edge.

None of these vendors have publicly responded to the specific attack vectors described in the paper as of early June 2025. Google and Microsoft have both discussed agent safety in general terms at developer conferences, but neither has published technical documentation detailing how their agents handle adversarial page content or whether they sandbox credential access from agent-initiated actions.

The lack of transparency around deployment numbers compounds the uncertainty. No browser maker has disclosed how many users currently have agent features active in production builds, making it difficult to estimate the real-world population exposed to this attack surface.

Why this is hard to fix

The core tension is architectural. Large language models, which power these agents, process all input text in a single stream. They have no built-in mechanism to distinguish between content the user intended them to read and content an attacker planted for them to follow. Researchers have been flagging this “data vs. instructions” confusion since the early days of LLM deployment, but the problem becomes far more dangerous when the model can click buttons, fill forms, and submit data on a live web page.

Potential mitigations exist in theory. Agents could be required to pause and request explicit user confirmation before performing any action involving credentials. They could operate in a sandboxed mode that blocks outbound data transmission to domains the user hasn’t pre-approved. They could maintain an allowlist of trusted sites where autonomous action is permitted and default to manual mode everywhere else.

But each of these safeguards introduces friction that undermines the core selling point of an agent: that it handles tedious tasks so you don’t have to. Browser makers face a direct tradeoff between security and the seamless experience they’re marketing. So far, the marketing appears to be winning.

What the research does and doesn’t prove

The paper is a preprint, meaning it has not yet undergone formal peer review. ArXiv, the platform hosting it, is supported by a coalition of major research institutions and screens submissions for scholarly rigor, but a preprint carries less weight than a peer-reviewed publication. The methodology, which uses structured attack categories and tests across multiple agents, is sound on its face, though independent replication would strengthen the conclusions.

Critically, the evaluation was conducted in controlled settings. No incident reports or breach disclosures have surfaced tying these attacks to real-world credential theft from everyday browser users. The research demonstrates that the vulnerability exists and is exploitable in principle. It does not prove that attackers are actively exploiting it in the wild today.

That distinction matters, but it shouldn’t be overly reassuring. Security researchers routinely identify attack classes before criminals adopt them at scale. The window between academic disclosure and real-world exploitation has historically been the period when defenses need to be built, and right now, there’s little public evidence that defenses are being built.

What you should do right now

If you use any browser or tool with AI agent capabilities, the most direct step is to disable those features for sensitive tasks. Banking, email, healthcare portals, and any site where you log in with credentials you care about should remain in manual-browsing territory until vendors publish specific safeguards against content-embedded instruction attacks.

Review your agent’s permission settings if they exist. Some tools allow you to restrict which sites the agent can interact with or require confirmation before form submissions. Turn those restrictions on. The convenience cost is small compared to the risk of an agent silently exfiltrating a password you didn’t even know it had access to.

More broadly, pay attention to what your browser is doing on your behalf. The shift from passive browsing to autonomous agents is one of the most significant changes in how people interact with the web in years, and it’s happening with remarkably little public discussion about the security tradeoffs involved. The researchers behind this paper have made those tradeoffs visible. What browser makers do with that information will determine whether AI agents become a trusted part of everyday browsing or the next major vector for credential theft.

More from Morning Overview

*This article was researched with the help of AI, with human editors creating the final content.