Knowledge Graph Infographic

Anthropic secretly installs spyware when you install Claude Desktop

The article argues that Claude Desktop silently installs Native Messaging manifests into multiple Chromium-browser paths, pre-authorizing a browser bridge without explicit user consent.

Core Thesis

Alexander Hanff documents an audit of Claude Desktop on macOS and argues that the application silently installs an undocumented Native Messaging bridge across multiple Chromium-browser directories, including browsers the user may not have installed. The article frames this as a dark pattern, a security risk, and in the author's view a legal and privacy violation because the bridge can expose authenticated browser sessions and automation capability once paired with an extension.

7Browser paths
31Install events reported
3Whitelisted extension IDs
19 minSource article read

Argument Structure

The infographic follows the structure of the generated knowledge graph: section claims, glossary entities, a how-to interpretation path, and linked FAQ nodes.

How The Argument Progresses

The knowledge graph models the article as an explicit sequence of reasoning steps rather than a loose summary.

1

Find the manifest

The article starts with an unexpected Anthropic Native Messaging file in a Brave browser path.

2

Attribute the installation

It then ties the manifest set to Claude Desktop using logs, timestamps, code-signing details, and provenance metadata.

3

Describe the risk surface

The author explains the browser-automation and authenticated-session implications once a paired extension is active.

4

Propose consent-based remediation

The article ends by calling for explicit opt-in, browser-specific scope, visibility, and persistent revoke controls.

Glossary From The Graph

These linked entities are exposed as DefinedTerm nodes in the RDF and mirrored in the embedded JSON-LD.

Native Messaging manifest

The configuration file a Chromium browser uses to allow an extension to invoke a local executable outside the browser sandbox.

Browser pre-authorization

The act of registering extension IDs and a local helper in advance of explicit extension installation.

Seven-browser install set

The article's finding that identical manifests were created for Arc, Brave, Chromium, Chrome, Edge, Vivaldi, and Opera paths.

Manifest rewrites

The repeated reinstallation or rewriting of the manifests reflected in timestamps and log history.

Signed helper binary

The code-signed helper executable inside Claude.app that the manifests authorize browsers to launch.

FAQ From The Knowledge Graph

Each question and answer below is linked to a separate resolver-backed node and mirrored in the metadata graph.

What is the core allegation in the article?

The article alleges that Claude Desktop silently installs an undocumented browser bridge without explicit user consent.

What artifact was discovered on disk?

A Native Messaging manifest named com.anthropic.claude_browser_extension.json was found in Chromium-browser support directories.

Why does the author treat that as significant?

Because Native Messaging hosts let browser extensions invoke local executables outside the browser sandbox at user privilege level.

How many browser paths does the article say were targeted?

The audit reports seven Chromium-browser paths.

What kind of evidence is used for attribution?

The article cites identical manifests, repeated install logs, timestamps, code-signing details, notarization context, and macOS provenance metadata.

What privacy risk does the author emphasize?

The article emphasizes access to authenticated browser sessions, DOM state, form interaction, and extracted page data once the bridge is active.

What security risk does the author emphasize?

It highlights expanded attack surface through a pre-authorized bridge, including prompt-injection and extension-compromise scenarios.

What dark pattern claim is central?

The article argues that Claude Desktop crossed browser trust boundaries silently and installed harder-to-remove integrations by default.

What remedy does the author want first?

The first requested remedy is explicit user consent before any browser-control bridge is installed.

What broader governance point closes the article?

The closing argument is that a vendor cannot credibly market safety while silently undermining privacy and data protection controls on user devices.