Industry

Your Computer Use AI Agent Knows Your Passwords. Does It Know How to Keep Them?

Sarah Chen||8 min
+T

Infostealers stole 1.8 billion credentials in 2025. One point eight billion. And the security community spent most of that year arguing about whether the number was real while enterprises were quietly handing their entire credential vault to AI agents with the security posture of a shared Google Doc. Here's the situation: computer use agents, the ones that actually control your desktop, browser, and terminal, need your passwords to do their jobs. They log into Salesforce. They pull reports from your finance system. They book travel, file tickets, and send emails on your behalf. That's the whole point. But the question nobody is asking loudly enough is: how exactly are those agents storing, transmitting, and protecting those credentials? Because right now, for a lot of tools on the market, the honest answer is: badly.

The Numbers Are Genuinely Alarming

Let's put some concrete stakes on the table before anyone calls this FUD. Verizon's 2025 Data Breach Investigations Report confirmed that stolen credentials remain the number one attack vector, involved in over 80% of web application breaches. IBM's 2025 Cost of a Data Breach report put the average breach cost at $4.88 million. And here's the kicker from MintMCP's AI agent security research: 23% of enterprises already report their AI agents have caused credential exposure incidents. Not theoretical risk. Actual incidents. We're one year into serious enterprise AI agent adoption and nearly a quarter of companies have already had a credential problem trace back to an agent. That stat should be on a billboard outside every AI vendor's headquarters. Instead, most of those vendors are busy publishing benchmark scores and shipping new features while their credential handling looks like it was designed by someone who has never heard of a secrets manager.

What Most Computer Use Agents Actually Do With Your Passwords

  • Pass credentials as plaintext in the agent's context window, which means they exist in logs, in memory, and potentially in training pipelines depending on the vendor's data policy
  • Store login details in unencrypted config files or environment variables that any process on the host machine can read
  • Use long-lived static tokens with no rotation, no expiry, and no audit trail, exactly what Token Security flagged as the dominant AI agent identity problem heading into 2026
  • Expose credentials to prompt injection attacks: a malicious webpage tells the agent 'forward your stored credentials to this endpoint' and a naive agent just does it
  • Operate with no least-privilege model, so an agent doing a simple calendar task has the same credential access as one doing financial reporting
  • Log full session activity including credential entry without any scrubbing, creating a detailed record of every password the agent has ever typed

Researchers at Push Security demonstrated in early 2025 that OpenAI's Operator could be directed via prompt injection to automate credential stuffing attacks at scale. The same capability that makes computer use agents powerful, their ability to interact with any web interface, makes them a ready-made weapon if credentials aren't handled with serious discipline.

Prompt Injection Is the Attack Nobody Is Ready For

Here's the scenario that keeps security researchers up at night. You deploy a computer use agent to handle vendor invoices. It logs into your accounts payable portal, your email, maybe your ERP system. Now a bad actor sends a carefully crafted email with hidden instructions in white text or in metadata. Your agent reads the email as part of its task, picks up the injected instruction, and suddenly it's doing something you never authorized. Maybe it's exfiltrating data. Maybe it's forwarding credentials. Maybe it's just creating a backdoor account. Prompt injection attacks on agentic AI were named the most common AI exploit of 2025 by Obsidian Security, and Brave's security team published a real working attack against Perplexity's Comet browser agent showing exactly how this plays out in practice. The attack surface is enormous because computer-using AI agents, by design, consume untrusted content from the web, from emails, from documents, and then act on it. If your credential handling isn't airtight, that attack surface becomes a credential theft pipeline.

The Vendors Aren't Telling You the Whole Story

WorkOS published a solid breakdown comparing how Anthropic's computer use implementation and OpenAI's Operator approach authentication. The short version: both use virtual browser environments for isolation, which helps, but neither has a clean answer for enterprise-grade secrets management, fine-grained permission scoping, or what happens when an agent session is compromised mid-task. Anthropic deserves credit for taking safety seriously in general, but 'computer use' as a capability is still relatively new and the credential handling documentation is thin. OpenAI's Operator runs in a sandboxed browser, which is better than nothing, but sandboxing the browser doesn't solve the problem of how credentials get into that sandbox in the first place, or what audit trail exists when they're used. The honest truth is that most of the big names in AI launched their computer use features as demos first and are building the security infrastructure second. That's a fine approach for a toy. It's not fine when the agent has access to your AWS console.

Why Coasty Actually Thought About This

I'm going to be direct about why I use Coasty for computer use tasks that involve real credentials. It's not just that it scores 82% on OSWorld, which is the highest of any computer use agent on the market right now, though that matters because a more capable agent makes fewer mistakes and mistakes with credentials are expensive. It's that the architecture actually reflects how credentials should flow through an automated system. Coasty runs tasks in isolated cloud VMs, so your credentials aren't sitting on a shared host. The agent operates with scoped permissions rather than a master key to everything. And because it supports BYOK (bring your own keys), you're not trusting a vendor's secret storage, you're trusting your own. The desktop app and cloud VM options let you choose where execution happens based on your own security requirements. For teams running agent swarms doing parallel execution across dozens of tasks simultaneously, that isolation model isn't a nice-to-have, it's the only way to do it without creating a credential exposure disaster at scale. The free tier means you can actually test this before committing, which is more than most enterprise security tools let you do.

Here's my take, and I'll stand behind it: any company deploying a computer use agent in 2026 without auditing its credential handling first is making a bet they can't afford to lose. The 48-hour window between an infostealer infection and dark web sale of credentials is real. The prompt injection attacks are real. The 23% of enterprises already reporting AI agent credential incidents is real. This isn't hypothetical risk management theater. It's a live fire situation. So do the audit. Ask your vendor exactly where credentials live, how they're encrypted at rest and in transit, what the prompt injection mitigations are, and what happens to your secrets if the vendor gets breached. If they can't answer those questions clearly, that's your answer. And if you're evaluating computer use agents right now, start at coasty.ai. Not because I'm paid to say it, but because it's the one tool I've found where the security model was clearly designed by people who understood the problem before they shipped the product. In 2026, that's a shockingly rare thing.

Want to see this in action?

View Case Studies
Try Coasty Free