हिन्दी ಕನ್ನಡ తెలుగు मराठी ગુજરાતી বাংলা ਪੰਜਾਬੀ தமிழ் অসমীয়া മലയാളം मनी9 TV9 UP
India Sports Tech World Business Career Religion Entertainment LifeStyle Photos Shorts Education Science Cities Videos

Perplexity launches BrowseSafe-Bench to boost security for Browser-Based AI agents

Perplexity has introduced BrowseSafe-Bench, an open-source benchmark and detection model designed to secure browser-based AI agents from prompt injection and hidden web attacks. The system scans full HTML pages in real time to flag malicious instructions before an agent can act on them.

It provides researchers and developers with over 14,000 realistic threat scenarios to test and strengthen AI browsing safety.
| Updated on: Dec 03, 2025 | 11:09 AM

New Delhi: Perplexity has released a new benchmark and detection model named BrowseSafe-Bench to secure AI agents that are incorporated in web browsers. The liberation is coming at a time when AI assistants are becoming no longer a mere querying tool but a kind of agent that can navigate and perform in a complex web ecosystem. As a result of this change, the risk of immediate injection and concealed hostile content has increased, which drives the developers to implement more powerful, real-time safety controls.

The new benchmark provides researchers and organisations with a realistic setting to evaluate the ability of AI systems to identify and withstand malicious instructions that are present in HTML. The companion detection model is a mixture-of-experts-based model providing high performance at a fast rate and is state-of-the-art to meet the live browsing requirements. Both the benchmark and model are also entirely open-source, to allow extensive testing and enhancement.

Also Read

BrowseSafe: Real-time protection for agentic browsing

BrowseSafe has been designed to scan entire web pages and detect concealed or malicious directions before they can be processed in an AI agent. It is capable of running at the speed of having a continuous real-time browsing task, unlike general-purpose models. The system is aimed at the detection of malicious text in the comments, templates, footers, and other parts of the sites that users never look at; however, the AI agent can see.

How to learn about browser prompt injection?

Timely injection occurs when system intruders include code that is used to supersede the initial instructions of an AI agent. Such attacks are usually concealed in the non-visible HTML, multi-linguistic text or polished paragraphs. Since entire pages are read by the agents, even minor hidden payloads are capable of changing the behaviour, unless caught early.

BrowseSafe-Bench has 14,719 examples, which are simulated websites, complete with sloppy HTML and noisy data. It consists of 11 types of attacks, nine strategies of injection, and three styles of lingo. The data can be used by researchers to examine the role of such factors as language tone, placement, and structure in the case of successful and unsuccessful attacks.

Defence in depth for safer web automation

The approach of perplexity is one that considers all web content as being untrusted. BrowseSafe scans raw HTML before it is read by the agent. There are restrictions on permissions of tools, and sensitive operations might need specific user consent. This multi-tiered security architecture will help keep browser-based agents in line with the intention of the user.

Both BrowseSafe and BrowseSafe-Bench are publicly available so developers can immediately test their own systems and strengthen them. The detection model is a localised model which allows high-speed scanning without relying on the cloud. In the meantime, the benchmark provides thousands of real-world attack scenarios which assist teams in detecting vulnerabilities and enhancing survivability in a very broad spectrum of browsing environments.

Photo Gallery

Entertainment

World

Sports

Lifestyle

India

Technology

Business

Religion

Shorts

Career

Videos

Education

Science

Cities