Claude Desktop Is Messing with Your Settings – Find Out Why Even Uninstalled Browsers Are Affected!

AI desktop app pre-installs Chrome extension permissions on macOS without user consent or disclosure

Alex Barrientos Avatar
Alex Barrientos Avatar

By

Image: Anthropic

Key Takeaways

Key Takeaways

  • Claude Desktop secretly installs Chrome browser surveillance files without user consent.
  • Privacy experts label the behavior “spyware” violating EU ePrivacy Directive regulations.
  • Anthropic remains silent about undisclosed browser integration and documentation gaps.

Trust your AI assistant to respect system boundaries? Claude Desktop for macOS quietly rewrites that agreement, installing browser configuration files for Chrome even when you’ve never touched Google’s browser. This isn’t a helpful integration—it’s pre-authorized surveillance infrastructure hiding in plain sight.

The Hidden Configuration Scandal

Installing Claude Desktop triggers something unsettling: the app writes a file called com.anthropic.claude_browser_extension.jsonacross your system’s browser directories. This manifest pre-authorizes three Chrome extension IDs for automatic access, essentially creating a backdoor that bypasses normal browser security protections.

Your future Chrome installation—if it ever happens—will grant Claude immediate access to read web pages, fill forms, and capture screens without asking permission first. The technical mechanics reveal the scope. Claude’s configuration enables communication with a local binary outside the browser sandbox, operating at full user privilege levels.

Think of it like finding hidden smart home devices pre-configured in your Airbnb—except these monitor your digital behavior instead of your physical movements.

Privacy Experts Sound Alarms

Privacy consultant Alexander Hanff pulls no punches, calling Claude Desktop’s behavior “spyware” and a breach of Article 5(3) of the EU’s ePrivacy Directive. The regulation requires explicit consent for data access or storage unless strictly necessary—and no user requested browser integration to justify these system modifications.

Security researcher Noah M. Kenney from Digital 520 confirms the technical claims as reproducible but disputes the “spyware” label. Still, he acknowledges credible EU regulatory risk.

Prompt injection vulnerabilities create additional attack vectors. Without mitigations, these vulnerabilities succeed 23.6% of the time; even with protections, 11.2% slip through.

Corporate Silence Speaks Volumes

Anthropic hasn’t responded to privacy allegations or explained why browser integration happens without disclosure. Their official documentation covers permission settings for Claude Code and troubleshooting browser connectivity—but completely omits mention of Native Messaging pre-installation.

This documentation gap feels deliberate, like burying the privacy implications in technical implementation details most users never see. The broader implications stretch beyond Claude Desktop.

AI companies increasingly blur application boundaries, and this incident sets a troubling precedent. Your desktop AI assistant shouldn’t secretly prepare surveillance capabilities for browsers you don’t use—but here we are, discovering that helpful AI comes with hidden behavioral monitoring infrastructure.

Share this

At Gadget Review, our guides, reviews, and news are driven by thorough human expertise and use our Trust Rating system and the True Score. AI assists in refining our editorial process, ensuring that every article is engaging, clear and succinct. See how we write our content here →