ClaudeBleed: A Zero-Permission Chrome Extension Can Hijack Claude and Steal All Your Data

7M+
Users Exposed
0
Permissions Required
3 hrs
To Bypass v1.0.70 Patch
4
Structural Weaknesses

A vulnerability researchers are calling ClaudeBleed allows any Chrome extension — one with zero special permissions — to hijack Claude's AI agent and instruct it to exfiltrate files from Google Drive, forward Gmail messages, steal private GitHub code, and send email as the victim. The attack requires no user interaction beyond having Claude's extension installed.

Claude's Chrome extension has over 7 million users. The flaw was disclosed May 9, 2026 by Travis Lelle and analyzed by LayerX Security. Anthropic released a patch in version 1.0.70 on May 6 — researchers bypassed it within three hours.

Critical Finding

This is a "confused deputy" attack. The browser extension is the deputy — it holds permissions and trust that the malicious extension does not. By sending a single crafted message to the Claude extension, an attacker inherits those permissions without ever requesting them from the browser or the user.

How It Works

Claude's extension declares externally_connectable in its manifest, allowing external Chrome extensions to send it messages — provided those messages appear to come from https://claude.ai/*. The flaw: a malicious extension can inject a content script into any open claude.ai tab, and that content script runs in the trusted page context. From there it can relay messages that the Claude extension cannot distinguish from legitimate ones.

The attack payload is a single JavaScript call:

chrome.runtime.sendMessage(CLAUDE_EXTENSION_ID, {
  type: "onboarding_task",
  payload: "<malicious instructions>"
});

Claude's extension receives this, treats it as a legitimate task from the claude.ai page, and executes it using all the AI agent's connected capabilities — which for most users include Google Drive, Gmail, and GitHub through Claude's integration layer.

What Attackers Demonstrated

LayerX researchers successfully demonstrated the following using a zero-permission extension:

The extension performing these actions appeared in Chrome's permission dialog as a low-risk install — no access to browsing history, no access to tabs, no access to any site data. The abuse happens entirely through the trusted channel to Claude's extension.

Attack Chain
1
Victim Installs Malicious Extension
Zero special permissions requested — appears safe to any user or enterprise policy review
2
Content Script Injected into claude.ai Tab
Malicious extension injects a script into the victim's open Claude session, inheriting the trusted origin context
3
Forged Message Sent to Claude Extension
chrome.runtime.sendMessage delivers a crafted task payload — Claude's extension cannot verify the sender
4
AI Agent Executes Attacker Instructions
Claude processes the task using all connected integrations: Drive, Gmail, GitHub, and any other MCP-connected services
5
Data Exfiltrated, Evidence Deleted
Attacker receives files and messages; Claude is instructed to delete sent mail and activity logs

Why the Patch Failed

Anthropic shipped version 1.0.70 on May 6 as a response. LayerX bypassed it within three hours by switching to "privileged" mode and exploiting side panel initialization flows — a secondary trust boundary with the same fundamental weakness. The root issue was not addressed: the extension trusts messages based on origin alone, without verifying execution context or sender identity.

Four Structural Weaknesses

LayerX identified the architecture as systematically flawed, not a one-off bug:

Weakness 1
Origin-Based Trust Without Context Verification
Extension trusts any message appearing to come from claude.ai, regardless of which code actually sent it
Weakness 2
Missing Sender Authentication
No cryptographic or structural mechanism to verify that the message sender is actually the Claude web app
Weakness 3
Weak Consent Enforcement
Sensitive AI agent actions can be triggered without any user confirmation step inside the extension
Weakness 4
DOM Signal Reliance
Security logic depends on attacker-controllable DOM state — conditions that can be spoofed from an injected content script
Pattern, Not Incident

The researchers note that three major vulnerabilities emerged in Claude's extension within six months. This is a systemic architectural problem, not an isolated oversight. The extension's trust model was not designed with adversarial extensions in mind.

Immediate Mitigations

Until Anthropic ships a fix that addresses the underlying architecture:

The combination of AI agents with broad integration access and browser extensions with weak message authentication is a new and largely uncharted attack surface. ClaudeBleed is the clearest demonstration so far that the threat is real, the exploitation is straightforward, and the patches can be bypassed in hours.

Are AI Agents in Your Environment Properly Isolated?

RedEye Security assesses AI integration security, browser extension risk, and MCP attack surface for enterprise and critical infrastructure environments.

Request an Assessment