§ feed · storyline
How We Built Security Into Computer
Perplexity details the security architecture behind its Computer autonomous agent, covering sandbox isolation, prompt injection defences, connector handling, and enterprise audit and admin controls.
Perplexity details the security measures built into their Computer autonomous agent system, including sandbox isolation, connectors handling, prompt injection defense, and enterprise governance features like audit logs and admin controls.
§ sources1 publication · timeline below
- perplexity.aiHow We Built Security Into Computerprimary