ssrf-methodology
Warn
Audited by Socket on Apr 22, 2026
2 alerts found:
Securityx2SecuritySKILL.md
MEDIUMSecurityMEDIUM
SKILL.md
这是一个与声明目的相符的 SSRF 攻击方法论 skill,但其目的本身就是指导 AI 代理实施漏洞利用、敏感文件读取、内网探测和云凭据获取。无明显供应链或隐蔽安装风险,但作为面向 AI 代理的攻防技能,整体安全风险高,应归类为高风险而非确认恶意软件。
Confidence: 96%Severity: 92%
Securityreferences/ssrf-bypass.md
MEDIUMSecurityMEDIUM
references/ssrf-bypass.md
This fragment is overtly weaponized SSRF exploitation material. It does not contain runnable code, so direct confirmation of malware execution is not possible, but the content is actionable for bypassing SSRF filters, probing internal services, harvesting cloud metadata, reading local files via file://, and chaining to high-impact outcomes like Docker API abuse. Treat as high supply-chain risk content if present in a dependency (malicious documentation/embedded payload intent).
Confidence: 70%Severity: 75%
Audit Metadata