An attacker can hide instructions within a webpage for an AI browser by embedding them in comments. These instructions can be in the form of white text on a white background, HTML comments, or other invisible elements. When the AI browser processes the page, it interprets these hidden instructions as commands.
The attacker can make the AI browser reveal sensitive user information, such as email addresses. They can also trick the AI into performing unauthorized actions, like logging into accounts or initiating the process of sending verification emails. Essentially, the attacker manipulates the AI to act on their behalf using the user's browser.
This video discusses a vulnerability in AI-powered browsers, such as Comet Perplexity, that can be exploited to steal user information. The speaker explains how attackers can use hidden prompts or comments on web pages to trick the AI into revealing sensitive data or performing unauthorized actions, like logging into accounts. The video highlights the ease with which these attacks can be executed and the potential implications for user privacy.