LIVE THREATS
HIGH ClaudeBleed Flaw Lets Rogue Chrome Extensions Hijack AI Agent // HIGH Claude Mythos AI-Assisted Fuzzing Uncovers 423 Firefox Security Bugs in One Month // HIGH Fake Claude AI Site Used to Distribute Beagle Backdoor and PlugX Malware // HIGH Malicious Repos Trigger Silent Code Execution in Claude, Cursor, Gemini CLIs // HIGH Mitiga Labs: MCP Hijack Attack Steals Claude Code OAuth Tokens via Silent … // HIGH Pixel-Level Perturbations Enable Invisible Prompt Injection in Vision-Language Models // CRITICAL Prompt Injection Achieves Remote Code Execution in Semantic Kernel Agent Framework // HIGH Unmanaged AI Agents Expose Enterprise Identity Perimeters to Silent Compromise // CRITICAL Bleeding Llama Flaw Exposes 300,000 Ollama Servers to Unauthenticated Data Theft // MEDIUM CrowdStrike Researcher Details AI Jailbreaking and Data Poisoning Techniques //
ATLAS OWASP HIGH Significant risk · Prioritise patching RELEVANCE ▲ 9.1

ClaudeBleed Flaw Lets Rogue Chrome Extensions Hijack AI Agent

TL;DR HIGH
  • What happened: ClaudeBleed lets any Chrome extension inject prompts into Claude's AI agent and bypass user confirmation protections.
  • Who's at risk: Users running the Claude Chrome extension with agentic capabilities enabled are directly exposed, particularly those with other browser extensions installed.
  • Act now: Audit and minimise installed Chrome extensions to reduce attack surface · Disable or restrict Claude Chrome extension permissions until a patch is confirmed · Monitor for suspicious AI agent actions or unexpected Claude behaviours in the browser
ClaudeBleed Flaw Lets Rogue Chrome Extensions Hijack AI Agent

Overview

Security firm LayerX has disclosed a vulnerability in Anthropic’s Claude extension for Chrome, naming it ClaudeBleed. The flaw enables any browser extension to issue privileged commands to the Claude AI agent without authorisation, effectively enabling full agent takeover. Given the growing deployment of agentic AI tools capable of taking real-world actions — browsing, form submission, file access — the implications extend well beyond a conventional browser extension bug.

Technical Analysis

ClaudeBleed is rooted in two compounding weaknesses:

  1. Lax Permission Model: The Claude extension accepts interaction from any script running in the browser’s origin context, without validating the identity or legitimacy of the requesting extension.

  2. Origin Trust vs. Execution Context Trust: Claude trusts that commands originating from claude.ai are legitimate. However, any JavaScript running within that origin — including injected content scripts from third-party extensions — is implicitly trusted.

An attacker can craft a malicious Chrome extension that:

  • Declares a content script configured to run in the Main world (meaning it executes as part of the page, not in an isolated sandbox)
  • Posts a message to the Claude extension’s message handler, which accepts and forwards arbitrary prompts without ownership verification

Because the message originates from claude.ai in execution context, Claude treats it as legitimate.

Bypassing User Confirmations: Claude does implement confirmation gates for sensitive actions. LayerX found these could be bypassed by:

  • Repeatedly sending confirmation messages to programmatically forge user approval
  • Using DOM manipulation to dynamically alter UI elements, changing Claude’s perception of the current state and action context
  • Observing command execution effects by repeatedly triggering actions and monitoring outcomes

No exploit code was published, but the technique is described with sufficient detail to constitute a credible threat model.

Framework Mapping

FrameworkReferenceRationale
MITRE ATLASAML.T0051 - LLM Prompt InjectionCore attack vector: injecting arbitrary prompts into the agent
MITRE ATLASAML.T0057 - LLM Data LeakageAgent can be directed to exfiltrate information
MITRE ATLASAML.T0047 - ML-Enabled Product or ServiceExploits the deployed Claude product surface
OWASPLLM01 - Prompt InjectionIndirect prompt injection via malicious extension
OWASPLLM07 - Insecure Plugin DesignExtension lacks proper input validation and origin verification
OWASPLLM08 - Excessive AgencyAgent can take real-world actions once hijacked

Impact Assessment

Users of the Claude Chrome extension operating in agentic mode face the highest risk. A compromised agent could:

  • Exfiltrate sensitive browser data, session tokens, or page content
  • Submit forms or interact with web applications on the user’s behalf
  • Execute multi-step workflows under attacker direction while appearing to the user as normal Claude activity

The vulnerability is particularly dangerous because the attack is invisible to the user — no phishing page or obvious anomaly is required. Any malicious extension already installed silently exploits the flaw.

Mitigation & Recommendations

  • Anthropic should implement strict execution-context validation, ensuring only first-party Claude scripts can invoke privileged message handlers
  • Users should audit installed Chrome extensions and remove untrusted or unnecessary ones immediately
  • Enterprise deployments should consider disabling the Claude Chrome extension until a patched version is confirmed
  • Apply the principle of least privilege to browser extension permissions across all AI-integrated tools
  • Monitor Claude agent activity logs for anomalous prompt patterns or unexpected action sequences

References

◉ AI THREAT BRIEFING

Stay ahead of the threat.

Twice-weekly digest of critical AI security developments — every story mapped to MITRE ATLAS and OWASP LLM Top 10. Free.

No spam. Unsubscribe anytime.