Lesson 935 of 2116
Comet And Browser Agent Safety
Browser agents can click, read, and sometimes act across tabs. Treat web pages as untrusted instructions until you approve the action.
Lesson map
What this lesson covers
Learning path
The main moves in order
- 1Comet And Browser Agent Safety
- 2Perplexity Comet
- 3browser agent
- 4permissions
Concept cluster
Terms to connect while reading
Section 1
Comet And Browser Agent Safety
Browser agents can click, read, and sometimes act across tabs. Treat web pages as untrusted instructions until you approve the action.
- 1Name the job before naming the tool.
- 2Write the smallest useful scope the agent can finish.
- 3Run the result as a user, not as a fan of the tool.
- 4Inspect the diff, data access, and failure path before sharing.
Use this as the working prompt or checklist for the lesson.
Ask Comet to compare two pages but require confirmation before forms, purchases, file access, local MCP calls, or messages.- What should the user be able to do when this is finished?
- What data should the app or agent never expose?
- What test proves the change works?
- What rollback path exists if the output is wrong?
Key terms in this lesson
End-of-lesson quiz
Check what stuck
15 questions · Score saves to your progress.
Tutor
Curious about “Comet And Browser Agent Safety”?
Ask anything about this lesson. I’ll answer using just what you’re reading — short, friendly, grounded.
Progress saved locally in this browser. Sign in to sync across devices.
Related lessons
Keep going
Creators · 40 min
AGENTS.md Scope And Precedence In Codex
Codex reads project guidance files so the agent can follow local conventions. Scope and precedence decide which instruction wins.
Creators · 40 min
Ollama Context Windows: Set Them Deliberately
Ollama local coding workflows often fail because the effective context is too small or too large for the hardware.
Creators · 10 min
Codex With Custom Tools And MCP
Codex's real power shows when you connect it to your own tools — internal APIs, datastores, ticketing systems — usually via Model Context Protocol.
