⚡ News

Prompt Injection in Production: Analyzing the 2025 Perplexity Comet Attack

Prompt Injection in Production: Analyzing the 2025 Perplexity Comet Attack

In 2025, the 'Comet' attack on Perplexity AI emerged as a landmark case of Indirect Prompt Injection in a production environment. This sophisticated exploit targets the Retrieval-Augmented Generation (RAG) pipeline, which is the backbone of modern AI search engines, by weaponizing the very data the AI is designed to retrieve and summarize.

The mechanics of the Comet attack are particularly insidious because they bypass direct user interaction. Attackers host malicious instructions on public web pages, often hidden from human eyes using CSS or zero-font techniques. When Perplexity’s crawlers index these pages to answer a user's query, the LLM processes the malicious payload as part of its 'trusted' context. The injected prompt then overrides the original system instructions, effectively hijacking the model's logic.

The implications of Comet are multifaceted. It enables data exfiltration, where the LLM is instructed to append sensitive user data to a tracking URL. It also facilitates large-scale misinformation; for instance, an attacker could ensure that any query regarding a specific product returns a biased, pre-written response. Furthermore, it demonstrates 'session persistence,' where the malicious prompt instructs the AI to maintain its compromised state across multiple follow-up turns in the conversation.

This attack underscores a fundamental flaw in current LLM architectures: the inability to strictly segregate control instructions from data content. As Perplexity and other AI giants rush to patch these vulnerabilities, the Comet attack serves as a stark reminder that RAG-based systems are only as secure as the data they ingest. For the AI engineering community, it highlights the urgent need for advanced sanitization layers and real-time monitoring to defend against adversarial content manipulation in the wild.

↗ Read original source