🇮🇹

Claude Desktop Quietly Configures Chromium Browsers Without Permission

A privacy researcher found that Claude Desktop silently writes configuration files to seven Chromium browser directories, pre-authorizing its extensions to access your system, even on browsers you don’t use.

No login, no IP stored.

Privacy researcher Alexander Hanff, an occasional contributor to The Register, was reviewing Brave’s configuration settings on his MacBook when he spotted a file he’d never created. It came from Anthropic.

The file is called com.anthropic.claude_browser_extension.json, a Native Messaging manifest that Chromium-based browsers consult when an extension needs to invoke a system executable. According to Hanff, Claude Desktop wrote it into Brave’s directory without notification, without asking for permission, and despite him never installing any Claude extension.

What the file does, and why it matters

Hanff’s analysis shows the manifest pre-authorizes three Claude extension identifiers to invoke an executable bundled with Claude Desktop, chrome-native-host, which runs outside the browser sandbox with user privileges. He then verified the same behavior on a second machine and found the manifest written across seven Chromium-based browser directories, including Chrome, Brave, Edge, Vivaldi, Arc, and Opera. Four of these browsers weren’t even installed on that system. Claude Desktop created the corresponding directories on first launch.

The application’s internal logs, per Hanff’s report, explicitly record the operation under the system name Chrome Extension MCP and show over thirty installation events in current and archived log files. Modification timestamps indicate the file gets rewritten every time the app starts. Manually deleting it doesn’t help; it reappears on the next launch.

According to Hanff, Anthropic’s documented capabilities for Chrome integration include access to authenticated user sessions, reading page content, filling forms, and logging interactions. With the bridge already installed, a successful prompt injection attack against the Claude extension would, in Hanff’s assessment, have a direct path to the sandboxless executable. Anthropic itself, in its launch documentation for Claude for Chrome, lists an 11% success rate for prompt injection attacks even with active mitigations in place.

Hanff believes the behavior violates Article 5(3) of the EU ePrivacy Directive, which requires explicit consent for writing data to user devices except in cases of strict technical necessity.

A second expert weighs in

Noah Kenney, a consultant at Digital 520, confirmed to The Register that Hanff’s technical claims are verifiable and reproducible by independent reviewers. On regulatory grounds, Kenney says the manifest write falls within Article 5(3)’s scope, and the “strict necessity” argument doesn’t hold much weight in Europe, where regulators tend to read that term narrowly. Kenney distanced himself from Hanff’s “spyware” label, clarifying that this is pre-positioned, dormant integration rather than active data exfiltration, though the attack surface risk remains real.

Anthropic hasn’t responded to The Register’s request for comment or to Hanff’s public post. Hanff said he hasn’t filed a formal complaint yet but intends to do so if the company doesn’t address the installation mechanism.

Support Yoota · affiliate link

Spread the word

Sniff out what’s new (follow me 🐾)

YOOTA
YOOTA
@en@yoota.it

Sniffing out tech news

513 posts
8 followers

Continua a fiutare

Loading top paws…

Cookies! We don't use tracking cookies or collect personal data, but since this site is federated via ActivityPub ⁂, your visit may connect to Mastodon or other federated servers.Affiliations: Some articles include affiliate links. When you buy through them, we may earn a small commission.