In recent years, the conversation on the safety of artificial intelligence has focused on protecting models, APIs and the "hidden" use of generative tools. However, there is a vector that almost no one is watching with the attention it deserves: browser extensions with IA capabilities. A recent report by LayerX shows that this gap is not less, but an emerging and very dangerous attack area that is often outside traditional corporate controls. The extensions live inside the browser and can therefore see and manipulate what your employees see, write and use without going through the usual records. You can see the summary of LayerX's report to further the technical findings and general recommendations: LayerX report.
To understand why this vector is so worrying enough to think about how extensions work. They are not isolated applications: they are integrated into the browser workflow. This implies potential access to the content of the pages, the forms that the user fills out and, in many cases, the cookies and sessions that keep employees connected in business applications. Measurements that are applied at the network level or to SaaS APIs do not necessarily detect or block malicious activity that is born exactly within the browser.

The study data show that the IA extensions present quantifiable risks: they have a significantly higher probability of showing known vulnerabilities, more often asking for permissions that open the door to exfiltration of data or browser manipulation. These capabilities - access cookies, run remote scripts or control tabs - are not mere technicalities: they translate into real danger, because they allow to steal session tokens, clone access interfaces or quietly redirect the user to phishing pages. In short, a malicious or compromised extension can turn the browser into a back door within the company's perimeter.
Another surprising fact is the speed of adoption and the persistence of these tools. The extensions are installed within seconds and can be installed and operated on machines managed and not managed for months or years. Moreover, it is not a niche phenomenon: almost all corporate employees use some extension and a significant proportion already uses at least an extension with IA functions. So, assuming that extensions are a "minor problem" of a few users is a mistake: we talk about a wide and distributed exposure.
The second false security comes from the way we usually evaluate the auxiliary software: trust static signals such as the number of downloads, the presence of a privacy policy or the history of updates. While these indicators help, they are not enough. Extensions change: they receive updates, can change the owner, or expand with new permissions. The LayerX report notes that many extensions linked to IA have increased their privileges in a short period and that a relevant proportion do not receive regular maintenance. A complement that seemed harmless yesterday can become a risk today.
In view of this scenario, the work of the security team should be redirected towards the visibility and continuous control of the browser environment. The first priority is to know which extensions are installed throughout the organization: in corporate browsers and personal equipment that access the company's resources. Comprehensive inventory allows prioritizing risks and detecting cases where an extension requests excessive permissions for its functionality. Official documentation on how extension permits work in Chromium helps to understand why certain privileges are particularly sensitive: Chrome extension documentation.
The traditional "static white list" practices must also be questioned. Maintaining a single approval over time does not reduce the threat of subsequent changes in the behavior of an extension. Instead, it is necessary to combine stricter governance policies for IA extensions with monitoring their performance. Such monitoring should focus on both declared permissions and actual actions: calls to external domains, attempts to access session cookies, script injections on sensitive pages or repeated manipulation of tabs and forms.
The security and good practices community has long been aware of the general problem of extensions, and there are resources that help to understand the technical nature of these risks. Organizations like OWASP maintain guides to assess attack surfaces and risks associated with third-party components, and browser developers publish recommendations and policies on permits and extension distribution. Consulting these sources helps to design more accurate and effective controls: OWASP.

In practice, there are several lines of action that reduce exposure without stifling productivity. It is recommended to impose minimum confidence criteria to allow an extension - for example, requirements on active maintenance, transparency of the publicator and a user threshold - and to apply technical restrictions from the corporate browser management console to limit who can install what and what permissions are granted. At the same time, it is essential to implement runtime detection and record relevant browser activity in order to investigate atypical behaviors. These measures help to mitigate attacks that evaded other security barriers.
Finally, the human factor should not be underestimated. Raising employee awareness of the risk of installing unverified extensions and providing clear channels to request approved tools reduces the likelihood of impulsive adoption. The safety of the browser cannot be just the task of the IT team; it must be integrated into the daily practices of equipment using productivity tools.
The conclusion is unequivocal: the browser extensions with IA functions have ceased to be a personal comfort to become a vector of business risk. If your organization does not yet have an inventory of extensions or specific policies for IA extensions, you are leaving an open window that attackers - and vulnerabilities - can take advantage of. To review specialized reports, understand the permissions and behaviour that can present sensitive sessions and data, and apply continuous and adaptive controls are essential steps to close that gap before a major incident occurs.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...