ssrf-testing
Audited by Socket on Mar 7, 2026
2 alerts found:
SecurityMalwareThe SSRF testing & prevention skill is coherent with a defensive-security objective but contains high-risk, actionable guidance for exploiting internal and cloud metadata endpoints. While it appropriately emphasizes authorization and safe testing practices, the inclusion of weaponized payloads, internal-service targeting, and out-of-band exfiltration techniques elevates risk. It is suitable only in tightly controlled, explicitly authorized environments and should be paired with strong cautions to prevent misuse. Overall risk posture is high due to clear data flow to internal endpoints and exfiltration/chained exploitation patterns.
This code is a deliberate SSRF exploitation reference providing multiple techniques to reach internal services and cloud metadata endpoints for credential theft and internal reconnaissance. It is dual-use but poses high risk if used against unintended or unauthorized targets. Treat presence of this content in a package or repo as a serious supply-chain risk and audit origin and intent before allowing execution or automated use.