A Survey on the Safety and Security Threats of Computer-Using Agents: JARVIS or Ultron?

arXiv cs.CL / 4/30/2026

💬 OpinionIdeas & Deep AnalysisModels & Research

Key Points

  • The paper examines “Computer-Using Agents (CUAs),” LLM-based systems that can autonomously operate desktop, web, and mobile applications via graphical interfaces.
  • It highlights that increasing agent capability also creates new safety and security risks, especially stemming from vulnerabilities in LLM reasoning and the added complexity of multimodal inputs and multiple software components.
  • The authors provide a structured synthesis of prior research through four objectives: defining suitable CUAs for safety analysis, classifying existing safety threats, proposing a defense taxonomy, and summarizing benchmarks, datasets, and evaluation metrics.
  • The resulting framework is intended to help future researchers identify unexplored vulnerabilities and give practitioners actionable guidance for designing and deploying secure CUAs.

Abstract

Recently, AI-driven interactions with computing devices have advanced from basic prototype tools to sophisticated, LLM-based systems that emulate human-like operations in graphical user interfaces. We are now witnessing the emergence of \emph{Computer-Using Agents} (CUAs), capable of autonomously performing tasks such as navigating desktop applications, web pages, and mobile apps. However, as these agents grow in capability, they also introduce novel safety and security risks. Vulnerabilities in LLM-driven reasoning, with the added complexity of integrating multiple software components and multimodal inputs, further complicate the security landscape. In this paper, we present a systematization of knowledge on the safety and security threats of CUAs. We conduct a comprehensive literature review and distill our findings along four research objectives: \textit{\textbf{(i)}} define the CUA that suits safety analysis; \textit{\textbf{(ii)} } categorize current safety threats among CUAs; \textit{\textbf{(iii)}} propose a comprehensive taxonomy of existing defensive strategies; \textit{\textbf{(iv)}} summarize prevailing benchmarks, datasets, and evaluation metrics used to assess the safety and performance of CUAs. Building on these insights, our work provides future researchers with a structured foundation for exploring unexplored vulnerabilities and offers practitioners actionable guidance in designing and deploying secure Computer-Using Agents.