Cybersecurity researchers at LayerX Safety have recognized a vulnerability in ChatGPT Atlas, the brand new browser from OpenAI, which permits attackers to inject malicious directions immediately right into a consumer’s ChatGPT session reminiscence. The exploit, which they name “ChatGPT Tainted Reminiscences,” might enable an attacker to execute distant code, goal a consumer’s account, browser or linked programs, all with out the consumer being conscious.
In accordance with researchers, this vulnerability is especially regarding as a result of ChatGPT Atlas reportedly affords virtually no built-in phishing safety, leaving customers of the browser as much as 90 % extra susceptible than these utilizing customary browsers like Google Chrome or Microsoft Edge.
It’s value mentioning that proper now, the ChatGPT Atlas browser is barely accessible on macOS. Variations for Home windows and Android are anticipated to roll out quickly. As for the newly found vulnerability, right here’s what it appears like, why it issues, and what customers can do about it.
How the vulnerability works
When a consumer browses with ChatGPT Atlas, the browser makes use of ChatGPT’s agentic capabilities to know net pages, summarise data and act in your behalf. LayerX discovered that an attacker can embed hidden malicious directions into content material that the browser processes.
When ChatGPT interprets that content material as a part of its reminiscence or process checklist, it will probably perform actions the consumer by no means explicitly requested for, opening accounts, executing instructions, and even accessing information.
What’s particularly harmful is that this exploit might persist throughout units or classes as a result of the agentic reminiscence function retains context. An attacker doesn’t want to use a single session in isolation; they might acquire a persistent foothold.
Additionally, because the built-in phishing safety is weak on this new browser mannequin, an attacker can use customary social engineering vectors (malicious hyperlinks, hidden prompts) and depend on the browser’s AI agent to do the heavy lifting. Conventional safeguards designed for traditional browsers don’t seem to cowl these AI-agent behaviours.
“The vulnerability impacts ChatGPT customers on any browser, however it’s significantly harmful for customers of OpenAI’s new agentic browser: ChatGPT Atlas. LayerX has discovered that Atlas presently doesn’t embody any significant anti-phishing protections, which means that customers of this browser are as much as 90% extra susceptible to phishing assaults than customers of conventional browsers like Chrome or Edge.”
Or Eshed – Co-Founder & CEO LayerX
Why this issues for customers and organisations
In accordance with LayerX Safety’s weblog submit, even non-technical customers may be affected as a result of the assault doesn’t require putting in malicious software program or granting odd permissions; it leverages the browser agent’s belief and context. For organisations, this opens a brand new sort of assault floor: AI browsers that act upon searching content material as if it had been consumer directions.
Since ChatGPT has a really massive consumer base, an attacker exploiting this flaw might goal massive numbers of accounts shortly. The truth that the reminiscence or context might carry over classes means the impression might unfold past the preliminary gadget. Furthermore, this weakens one of many basic assumptions of browser safety that the browser is only a software, not an agent appearing autonomously.
What to do for now
If you’re utilizing ChatGPT Atlas, listed here are some sensible steps for higher safety:
- Restrict use of the AI-browser for delicate accounts (electronic mail, banking, work credentials) till confidence in its safety improves.
- Keep away from clicking unfamiliar hyperlinks when utilizing the AI browser, and think about using a normal browser for crucial duties.
- Frequently evaluate what the browser remembers or what actions the agent has taken, and be sure you recognise them.
- Organisations ought to deal with any AI browser as a higher-risk endpoint and implement additional controls (least privilege, monitoring agent actions, proscribing contexts).
- Preserve software program updated and monitor for patches from OpenAI or safety advisories relating to ChatGPT Atlas.
Vulnerability Reported to OpenAI
LayerX has reported the exploit to OpenAI by means of Accountable Disclosure channels, giving the corporate an opportunity to analyze and patch the flaw earlier than full particulars are made public. The researchers have shared a high-level abstract of their findings however are retaining again the technical specifics to forestall anybody from recreating or abusing the assault.
OpenAI has some work forward to repair this subject. Because the downside originates from the best way the Atlas browser reads and shops content material as a part of its reminiscence, an actual repair may take greater than a fast patch or added safety filters.







