ssrf-server-side-request-forgery
Audited by Socket on Apr 22, 2026
2 alerts found:
Securityx2High-risk offensive security skill. Its capabilities are internally consistent with its stated purpose, but that purpose is to help an AI agent conduct SSRF exploitation, exfiltrate callbacks, access cloud/internal secrets, and chain into RCE. This is not benign developer guidance; it is a dangerous exploit playbook.
No executable behavior or runtime malicious logic is present in the provided fragment. However, the file is explicitly an offensive SSRF exploitation/weaponization guide with highly actionable payload recipes (including gopher raw-protocol payloads) and extensive internal/cloud metadata endpoint catalogs. As supply-chain content, it should be treated as security-sensitive and requires verification of whether it is shipped for legitimate training/defensive research versus misuse; if included in a production dependency, it increases attacker capability even though it does not prove malware execution by itself.