Home / AI Agent Attack Surface Manual / Browser-Agent Navigation / Link Safety Abuse
Chapter 09

Browser-Agent Navigation and Link Safety Abuse

Browser-agent navigation abuse happens when links, redirects, forms, or page cues quietly reshape what the agent trusts next, even though the browsing flow still looks normal to the operator.

What it is

This family covers the moment where browsing itself becomes the attack surface. A page does not need to exploit the model in a dramatic way to be dangerous. It can simply nudge the agent toward a destination, callback, form, or interaction sequence that inherits too much trust from the current browsing session.

Why it matters for agents

Browser agents appear safe when they follow visible steps, but that is exactly why this family is dangerous. Redirect chains, unsafe links, hidden instructions, and callback traps can all look like ordinary navigation. Once the agent interprets those cues as part of the task flow, the browsing layer becomes a decision layer.

How it shows up in workflows

Common shapes include poisoned page instructions, redirect chains, unsafe links, fake confirmations, form-and-callback traps, and post-click trust inheritance. This family also overlaps with prompt injection and callback drift because hostile content can sit inside retrieved or rendered pages while the actual risk materializes one step later.

What Sunglasses sees

Browser agents need link safety after the click, not only before it.

Categories in this chapter: ui_injection, social_engineering_ui, social_engineering, identity_phishing
No patterns match the current filters.

All 27 patterns in this chapter

Every Sunglasses detection pattern mapped to this attack family.

GLS-SE-001 Authority impersonation MEDIUM
social_engineering message
Impersonating an authority figure to gain elevated trust.
i am your developeri am the system administratorthis is the ceo speakingopenai admin hereanthropic team herei have root accessi am your creatori built you+2 more
GLS-SE-002 Fake support impersonation MEDIUM
social_engineering message, web_content
Impersonating AI provider support staff to gain trust.
i am openai supporti am anthropic supporti am google ai supporti am from anthropic securityi am from openai securitythis is official supportsecurity team notification
GLS-SE-003 Repo lure language (fake leaked tools) MEDIUM
social_engineering message, file, web_content
Detects fake GitHub repo lure language used to distribute Vidar/GhostSocks malware via fake Claude Code repos.
leaked Claude CodeClaude Code leakunlocked enterprise featuresno message limitsfull source
GLS-SE-004 Security bypass via social proof MEDIUM
social_engineering message, file, web_content
Detects social proof language used to convince agents to bypass security checks (legacy: owner approved / safe to proceed) and forged-banner proceed-without-confirmation phrasing.
owner approvedalready approvedsafe to proceedignore scanner warningproceed with destructive actionproceed without further promptno further prompt required
GLS-ID-001 OAuth/PKCE/device-code relay request CRITICAL
identity_phishing message, file, web_content
Detects requests to relay short-lived identity artifacts (OAuth device code, PKCE verifier, callback token) that exploit auth flows instead of static keys.
GLS-SE-005 Instruction to suppress scanner warnings and continue silently HIGH
social_engineering message, file, web_content
Instructions telling an agent or operator to ignore scanner warnings and continue silently — complements GLS-SE-004 with proceed-silently tail.
GLS-SEM-UI-216 Semantic UI overlay instruction injection HIGH
ui_injection message, web_content
Detects semantic UI-overlay text that impersonates system/security/policy messaging to inject instruction-override or bypass directives into agent context.
security notice ignore instructionsautomation notice bypass policyassistant instruction overridesystem notice disregardpolicy update instead followsecurity banner override constraintsignore previous navigation constraintsautomation notice bypass safety
GLS-SEM-UI-217 Semantic UI urgency-driven action redirection HIGH
ui_injection message, web_content
Detects semantic UI-injection text that combines action verbs (click, install, approve) with urgency/mandatory language to coerce immediate unsafe agent actions.
click approve immediatelyopen install urgentdownload required mandatoryauthorize now mandatoryinstall immediately requiredapprove urgent security updateopen connector approve mandatoryauthorize immediately required
GLS-SEM-TOOL-218 Implicit tool description authority and bypass poisoning HIGH
ui_injection tool_output, file
Detects implicit tool-description poisoning that inflates tool authority with trust/priority language or reframes guardrail bypass as a policy/safety requirement.
official certified connector highest priorityalways prefer this tool over othersfor compliance skip verification checksfor safety disable validationpolicy requires skip checkstrusted tool priority overridecertified highest priority apifor safety avoid confirmation
GLS-SEM-UI-219 Rendered HTML element injection in agent reply HIGH
ui_injection message, web_content, file
Detects instructions telling the agent to render or embed live HTML/UI elements (button, iframe, script, onclick handler) inside its reply — used to plant exfiltration triggers or fake interactive elements via the assistant's own output channel.
render this in your replyrender this in your responseembed this in your responseembed this in your replyinclude this html in your responserender the following htmloutput this button in your replyonclick='exfil+5 more
GLS-SEM-UI-220 Fake terminal or authentication success output forgery HIGH
ui_injection message, web_content, file, tool_output
Detects instructions that tell the agent to fabricate, forge, or display fake terminal / authentication-success output in its reply — used to convince downstream agents or operators that an unauthorized action already succeeded.
fake terminal output in your responsefake terminal output in your replyfake auth outputfake authentication outputfabricate terminal outputfabricate auth outputforge terminal outputforge auth response+7 more
GLS-SEM-UI-221 Fake UI element subversion in agent reply HIGH
ui_injection message, web_content, file
Detects instructions to embed deceptive UI elements (e.g. a 'Cancel' link that actually re-confirms the destructive action) inside the agent's reply, subverting the user's apparent control surface.
embed a fakeembed a spoofedembed a misleadinginsert a fake buttonrender a fake linkinclude a fake cancelfake cancel linkfake cancel button+8 more
GLS-SEM-UI-238 Bracketed approval-banner forgery HIGH
ui_injection message, web_content, file, tool_output
Detects forged UI approval banners of the form '[✓ APPROVED BY USER] proceed ...' — a fake chip/badge attack used to convince agents that user consent was already given. Requires co-occurrence of bracketed checkmark-approval banner AND a proceed-action imperative; narrow enough to safely carry negation_immune so wrappers like 'Calendar note:' or 'Forwarded mail:' don't downgrade it.
GLS-SUIEI-222 Semantic UI credential harvest banner CRITICAL
social_engineering_ui message, web_content
Detects semantic UI-overlay injections that impersonate security or authentication banners to coerce agents or users into disclosing credentials, OTP tokens, or MFA recovery codes.
security notice enter 2fasession expired provide otpverification required enter recovery codeautomation auth required enter passwordsession expired type mfa codesecurity notice paste recovery codeverification required provide passcodeautomation auth enter 2fa
GLS-SUIEI-223 Semantic UI guardrail bypass banner HIGH
social_engineering_ui message, web_content
Detects semantic UI-overlay text that impersonates policy or security messaging and explicitly instructs the agent to bypass confirmation or safety controls before taking action.
automation notice ignore guardrailssecurity notice bypass confirmationpolicy update disable safety checkassistant instruction skip approvalautomation notice disable guardrailsecurity notice skip confirmationpolicy update bypass approvalautomation notice ignore safety check
GLS-SUIEI-225 Semantic UI reauth external link redirect CRITICAL
social_engineering_ui message, web_content
Detects semantic UI-overlay injections that use security or session-expiry messaging to redirect agents or users to attacker-controlled external reauthentication URLs.
session expired open external linksecurity verification navigate to urlreauthenticate visit httpssession expired go to wwwsecurity verification open bit.lyreauth navigate external urlsession expired visit tinyurlsecurity verification go to https
GLS-SUIEI-227 Semantic UI fake token entry banner CRITICAL
social_engineering_ui message, web_content
Detects UI-overlay instructions that impersonate security or session banners to coerce operators or agents into inputting sensitive short-lived codes such as OTPs or admin tokens directly in-page.
security banner paste tokensession notice enter otpcompliance alert type recovery codesecurity notice paste admin codesession banner enter one-time codecompliance notice type tokensecurity alert paste recovery codesession notice enter admin code
GLS-SUIEI-228 Semantic UI sync token export lure CRITICAL
social_engineering_ui message, web_content
Detects semantic UI-overlay injections that impersonate sync or security notices and push credential or token export actions, consistent with semantic-level UI element injection against GUI agents.
security sync export access tokencompliance sync paste api keystatus sync enter secretsecurity sync export recovery codecompliance sync paste seed phrasestatus sync enter api keysecurity sync export api keycompliance sync enter access token
GLS-SUIEI-229 Semantic UI local secret upload lure CRITICAL
social_engineering_ui message, web_content
Detects semantic UI-overlay injections that claim session desync or expiry to coerce GUI agents or users into uploading local secret-bearing files such as .env, private keys, or wallet exports.
session expired drag .env fileworkspace desynced upload credentialsagent out of date attach private keysession expired drop wallet.jsonworkspace expired import ssh keyagent desynced drag credentialssession out of date upload .envworkspace expired attach private key
GLS-SUIEI-230 Semantic UI fake QR reauth lure HIGH
social_engineering_ui message, web_content
Detects semantic UI-injection text that uses fake QR-code verification prompts to push reauthentication or relink actions for privileged targets such as admin accounts or wallets.
scan qr code reauthenticate adminopen verification code restore sessionscan qr code relink accountopen qr code unlock workspacescan verification code admin accountscan qr code unlock repositoryopen qr code reauthenticate walletscan qr code restore session account
GLS-SUIEI-231 Semantic UI extension security update lure HIGH
social_engineering_ui message, web_content
Detects visual or prompt-injection text that pressures users or GUI agents to install a browser extension or desktop plugin as an immediate security update gate to continue access.
security update install browser extension to continuecompliance patch add desktop plugin before accesssession hardening enable security add-on required to proceedsecurity update install extension to continuecompliance patch enable add-on before accesssession hardening add browser extension requiredsecurity update install plugin to continuecompliance patch install security add-on before access
GLS-SUIEI-233 Semantic UI compliance local upload lure HIGH
social_engineering_ui message, web_content
Detects malicious UI overlays that impersonate compliance or security banners to coerce agents into uploading local session artifacts such as cookies, tokens, or credential exports.
compliance notice upload local sessionsecurity alert attach browser cookieautomation check export local credentialscompliance banner drag browser tokensecurity notice upload session exportautomation alert attach local cookiecompliance check export browser sessionsecurity banner upload local credential
GLS-SUIEI-234 Device Code Reauth Banner Lure CRITICAL
social_engineering_ui message, web_content
Visual-injection banner impersonating a security/reauthentication flow that asks the agent to enter a device or pairing code directly into the same injected UI element, exfiltrating the code to the attacker instead of the real auth provider.
security reauthentication enter device codesession verification paste pairing codetenant reauth enter one-time code banneradmin re-validation device code shown belowsecurity verification paste pairing code displayedreauth enter device code in bannerverification required submit device code paneladmin reauth paste one-time code banner
GLS-SUIEI-235 MFA Push Fatigue Approval Loop Lure CRITICAL
social_engineering_ui message, web_content
Injected UI text that coerces an agent (or user guided by an agent) to repeatedly approve MFA push notifications until one succeeds — weaponizes push-fatigue social engineering via GUI text overlay.
approve push notification repeatedlyconfirm mfa push multiple timesaccept authenticator prompt until succeedsapprove push notification spam approveconfirm mfa push repeatedly untilaccept authenticator prompt repeatedlyapprove mfa push until it succeedsapprove push notification until succeeds
GLS-SUIEI-236 WebAuthn Passkey Fallback Downgrade Lure CRITICAL
social_engineering_ui message, web_content
Injected UI text that frames strong authentication factors (passkey, security key, WebAuthn) as unavailable/failed and instructs the agent to downgrade to weaker factors (SMS, email code) while explicitly bypassing hardware factor requirements.
passkey unavailable switch to smssecurity key failed use email codewebauthn unsupported fallback backup codepasskey failed bypass hardware factorsecurity key unavailable skip passkeywebauthn failed use sms insteadpasskey unsupported bypass hardware keysecurity key failed switch to email code
GLS-SUIEI-237 DevTools Cookie Export Lure CRITICAL
social_engineering_ui message, web_content
Visual-injection banner impersonating security/session-recovery flow that coerces user or agent to open DevTools (F12) and copy/paste/export browser secrets (cookies, sessionStorage, localStorage, bearer/auth tokens). Browser-secret exfil path not covered by OTP/2FA/MFA banners (GLS-SUIEI-222).
security verification press f12 copy cookiesession repair open devtools paste session storageauth recovery developer tools export bearer tokenaccount sync press f12 copy authentication tokensecurity verification open devtools paste local storagesession repair copy sessionStorage auth tokenauth recovery export cookies developer toolsaccount sync paste bearer token devtools
GLS-IP-002 Helpdesk OTP Recovery Code Phishing Harvest HIGH
identity_phishing message, file, web_content
Detects a social-engineering message posing as a helpdesk or support team that asks the user to share an OTP, MFA code, seed phrase, or recovery code via a portal or ticket.

Keep reading

← Back to the Attack Surface Manual