BotBeat
...
← Back

> ▌

AnthropicAnthropic
POLICY & REGULATIONAnthropic2026-04-22

Anthropic's Claude Desktop Faces Privacy Scrutiny for Installing Browser Extensions Without User Consent

Key Takeaways

  • ▸Claude Desktop installs browser extension configuration files and pre-authorizes Chrome extensions without user knowledge or consent, even for browsers not yet installed
  • ▸The practice potentially violates EU's ePrivacy Directive (Article 5(3)) and computer misuse laws by modifying other vendors' applications without explicit permission
  • ▸The Native Messaging bridge runs outside browser sandbox protections at user privilege level, creating a potential security path for prompt injection attacks to access system-level operations
Source:
Hacker Newshttps://www.theregister.com/2026/04/20/anthropic_claude_desktop_spyware_allegation/↗

Summary

Privacy consultant Alexander Hanff has raised serious concerns about Claude Desktop for macOS, alleging that the application installs configuration files and pre-authorizes browser extensions without explicit user consent. Specifically, Claude Desktop creates a Native Messaging manifest file (com.anthropic.claude_browser_extension.json) that grants three Chrome extension identifiers access to the system, even on browsers not yet installed on the user's device. This approach allows future browser installations to automatically grant Claude access to sensitive functionality like reading web pages, filling forms, and capturing screenshots.

Hanff contends that these practices violate Article 5(3) of the EU's ePrivacy Directive, which requires explicit consent before accessing user data, and potentially constitute violations of computer misuse laws. The critic characterizes the behavior as a "dark pattern" and claims it amounts to "spyware," noting that the pre-installed bridge application runs outside the browser sandbox at user privilege level without permission prompts. Hanff also highlights security vulnerabilities, citing Anthropic's own safety data showing a 23.6% prompt injection success rate against Claude for Chrome without mitigations. Anthropic has not publicly responded to the allegations.

  • The installation is difficult to discover and remove, with no opt-in mechanism or clear disclosure of the scope of authorized access

Editorial Opinion

This disclosure raises troubling questions about Anthropic's privacy practices and represents a significant disconnect from the company's public positioning as "safety conscious." Pre-authorizing browser extensions without user knowledge—especially on systems where those extensions haven't been installed—crosses an important ethical line regarding user autonomy and informed consent. If the allegations are substantiated, Anthropic will need to provide transparent remediation and explain how such practices align with its stated commitment to responsible AI development.

Regulation & PolicyEthics & BiasPrivacy & Data

More from Anthropic

AnthropicAnthropic
PARTNERSHIP

Anthropic Embraces Hardware With Bluetooth API, Inspired by Schematik's 'Cursor for Hardware' Platform

2026-04-22
AnthropicAnthropic
RESEARCH

Codex and Claude Code Take Different Approaches to AI Sandboxing Security

2026-04-22
AnthropicAnthropic
RESEARCH

Anthropic's Claude Opus 4.7 Passes Rigorous Runtime-Trust Security Evaluation in CVP Run 2

2026-04-22

Comments

Suggested

Xorbits (Xinference maintainers)Xorbits (Xinference maintainers)
POLICY & REGULATION

TeamPCP Compromises Xinference PyPI Package in Latest Supply Chain Attack

2026-04-22
McClatchyMcClatchy
INDUSTRY REPORT

McClatchy's AI Repackaging Strategy Creates Byline Controversy and Legal Risks for Journalists

2026-04-22
Tesla (FSD/Optimus)Tesla (FSD/Optimus)
POLICY & REGULATION

Tesla's Texas Lithium Refinery Discharges Toxic Metals; Drainage District Demands Halt

2026-04-22
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us