Failure Pattern: Autocomplete Leaks Identity Into Malicious Pages
The browser auto-fills identity fields into phishing pages that look legitimate.
User Impact
The user believes the website already “knows” them because of autocomplete — reinforcing trust in a malicious site.
Underlying Causes
Domain-level heuristics too weak
Lookalike domains bypass auto-fill restrictions
No cryptographic trust of page identity
Trust-Native Resolution
Auto-fill triggers only when the page is verified through DTL trust-level identity, not when domains merely “look” right.
Broken Trust Assumption
Many of the most damaging breaches of the past decade occurred in environments that were fully authenticated, encrypted, and compliant.
Incidents including SolarWinds, NotPetya, Capital One, and MOVEit show a consistent pattern: attackers succeeded by inheriting trust, not by breaking it. Security controls validated access, but not intent.
