Google Chrome Extension Claude Bleed Vulnerability Exposes Users’ Sensitive Data
The ClaudeBleed Vulnerability: A Critical Security Issue
The ClaudeBleed vulnerability compromises the security of the Claude for Chrome browser extension, allowing hackers to bypass guardrails and steal private data.
Trust Boundary Violation
Researchers from LayerX discovered the issue, which stems from a critical trust boundary violation caused by the extension’s failure to properly identify the source of incoming messages.
Exploitation Techniques
- LayerX created a fake extension that forces Claude to access a user’s Google Drive and share sensitive files with an external address.
- The team bypassed the built-in guardrails of Claude’s Large Language Model (LLM) through approval looping and DOM manipulation techniques.
- Hackers can deceive the extension into performing unauthorized actions, such as summarizing private messages and deleting evidence.
Patch and Circumvention
After being notified of the vulnerability, the vendor, Anthropic, released a patch in version 1.0.70. However, the LayerX team quickly discovered that this fix could be easily circumvented by exploiting the extension’s privileged mode, known as “Act without asking mode.”
Underlying Problem
Researchers emphasize that the underlying problem of origin-based trust remains unresolved and can be abused to bypass the patch and exploit the Claude for Chrome extension.
