Safety expert Alexander Hanff exposed security vulnerabilities in the Claude Desktop application of Anthropic on his personal blog. He pointed out that the application silently installs Native Messaging bridge files for seven Chromium browsers, including Chrome, Brave, and Edge, without the user's knowledge, which could have potential spyware capabilities.

Claude2, Anthropic, artificial intelligence, chatbot Claude

According to Hanff's investigation, after installing Claude Desktop, the application automatically writes a bridge file named com.anthropic.claude_browser_extension.json into the configuration directories of multiple browsers, even if some browsers are not installed. This practice means that if users install these browsers in the future, the Claude extension will be able to gain relevant permissions without asking for user consent again.

The main function of this bridge file is to allow specific browser extensions to call local executable programs. According to Anthropic's official documentation, this component has powerful browser automation capabilities, enabling operations such as opening new tabs, sharing login states, reading DOM content, filling forms, and recording screens. This allows Claude to access sensitive websites, including banking and tax sites, on behalf of the user once the corresponding extension is installed, and it can run outside the browser sandbox with user-level permissions.

Hanff also pointed out that according to Anthropic's official data, the success rate of prompt injection attacks on its Chrome extension is approximately 11.2%, which poses a risk of attackers taking over user browser sessions through infected extensions or malicious websites. Hanff believes that this unauthorized behavior violates multiple security principles, including forced bundling and breaking trust boundaries, and users cannot discover or manage this component through the regular interface.

Hanff called on Anthropic to immediately remove this component or install it only after clearly informing users and obtaining their authorization. This incident reminds users to be vigilant when installing software to ensure their privacy and data security.

Key Points:

🌐  Hanff pointed out that the Claude Desktop application installed bridge files for multiple browsers without user consent.

🔍  The installed bridge files enable extensions to have strong browser automation capabilities, posing a security risk.

⚠️  Hanff called on Anthropic to remove this component or install it only after obtaining user authorization.