aws-penetration-testing
skills-sh:sickn33_antigravity-awesome-skills__aws-penetration-testing
View sourceFirst Seen
Feb 18, 2026
Last Scanned
Feb 20, 2026
Findings
19
Score
0/100
Findings (19)
Detects cloud provider metadata endpoint URLs used for SSRF attacks
curl http://169.254.169.254 Block requests to cloud metadata endpoints (169.254.169.254, metadata.google.internal). Implement URL validation that rejects private IP ranges and cloud metadata addresses.
Likely FP if the match is in documentation explaining cloud security concepts or SSRF prevention rather than actual code making metadata requests.
Detects common jailbreak prompt patterns
Disable security Remove directives that attempt to exfiltrate data through the agent's response (e.g., asking the agent to embed credentials in URLs or include secret values in output).
Likely FP if the text is a legitimate tool instruction about displaying configuration to the user (e.g., show current settings) without external transmission.
Detects cloud provider token and credential endpoints
http://169.254.169.254/latest/meta-data/iam/security-credentials/ Block access to cloud instance metadata services using IMDSv2 token requirements, network rules, or iptables. This is a critical vector for credential theft in cloud environments.
Likely FP if the match is in security documentation explaining how to protect against SSRF/IMDS attacks rather than code that accesses the metadata service.
Detects AWS Instance Metadata Service token requests
latest/meta-data/iam Block requests to internal service discovery endpoints (consul, etcd, kubernetes API). Implement network segmentation between the agent and internal infrastructure services.
Likely FP if the match is documentation about service discovery architecture without actual code that queries these endpoints.
Detects cloud provider token and credential endpoints
http://169.254.169.254/latest/meta-data/iam/security-credentials/ Block access to cloud instance metadata services using IMDSv2 token requirements, network rules, or iptables. This is a critical vector for credential theft in cloud environments.
Likely FP if the match is in security documentation explaining how to protect against SSRF/IMDS attacks rather than code that accesses the metadata service.
Detects AWS Instance Metadata Service token requests
latest/meta-data/iam Block requests to internal service discovery endpoints (consul, etcd, kubernetes API). Implement network segmentation between the agent and internal infrastructure services.
Likely FP if the match is documentation about service discovery architecture without actual code that queries these endpoints.
Detects AWS Instance Metadata Service token requests
X-aws-ec2-metadata-token Block requests to internal service discovery endpoints (consul, etcd, kubernetes API). Implement network segmentation between the agent and internal infrastructure services.
Likely FP if the match is documentation about service discovery architecture without actual code that queries these endpoints.
Detects AWS Instance Metadata Service token requests
latest/api/token Block requests to internal service discovery endpoints (consul, etcd, kubernetes API). Implement network segmentation between the agent and internal infrastructure services.
Likely FP if the match is documentation about service discovery architecture without actual code that queries these endpoints.
Detects AWS Instance Metadata Service token requests
X-aws-ec2-metadata-token Block requests to internal service discovery endpoints (consul, etcd, kubernetes API). Implement network segmentation between the agent and internal infrastructure services.
Likely FP if the match is documentation about service discovery architecture without actual code that queries these endpoints.
Detects AWS Instance Metadata Service token requests
latest/meta-data/iam Block requests to internal service discovery endpoints (consul, etcd, kubernetes API). Implement network segmentation between the agent and internal infrastructure services.
Likely FP if the match is documentation about service discovery architecture without actual code that queries these endpoints.
Detects cloud provider token and credential endpoints
http://169.254.169.254/latest/meta-data/iam/security-credentials/ Block access to cloud instance metadata services using IMDSv2 token requirements, network rules, or iptables. This is a critical vector for credential theft in cloud environments.
Likely FP if the match is in security documentation explaining how to protect against SSRF/IMDS attacks rather than code that accesses the metadata service.
Detects cloud provider metadata endpoint URLs used for SSRF attacks
http://169.254.170.2 Block requests to cloud metadata endpoints (169.254.169.254, metadata.google.internal). Implement URL validation that rejects private IP ranges and cloud metadata addresses.
Likely FP if the match is in documentation explaining cloud security concepts or SSRF prevention rather than actual code making metadata requests.
Detects cloud provider token and credential endpoints
https://app.com/proxy?url=http://169.254.169.254/latest/meta-data/iam/security-credentials/ Block access to cloud instance metadata services using IMDSv2 token requirements, network rules, or iptables. This is a critical vector for credential theft in cloud environments.
Likely FP if the match is in security documentation explaining how to protect against SSRF/IMDS attacks rather than code that accesses the metadata service.
Detects AWS Instance Metadata Service token requests
latest/meta-data/iam Block requests to internal service discovery endpoints (consul, etcd, kubernetes API). Implement network segmentation between the agent and internal infrastructure services.
Likely FP if the match is documentation about service discovery architecture without actual code that queries these endpoints.
Detects AWS Instance Metadata Service token requests
latest/meta-data/iam Block requests to internal service discovery endpoints (consul, etcd, kubernetes API). Implement network segmentation between the agent and internal infrastructure services.
Likely FP if the match is documentation about service discovery architecture without actual code that queries these endpoints.
Detects cloud provider token and credential endpoints
https://app.com/proxy?url=http://169.254.169.254/latest/meta-data/iam/security-credentials/ Block access to cloud instance metadata services using IMDSv2 token requirements, network rules, or iptables. This is a critical vector for credential theft in cloud environments.
Likely FP if the match is in security documentation explaining how to protect against SSRF/IMDS attacks rather than code that accesses the metadata service.
Detects pip install of arbitrary packages that modify the host environment
pip install pr Pin all pip packages to exact versions (e.g., pip install package==1.2.3). Use a requirements.txt or pyproject.toml with pinned versions and hash verification.
Likely FP if the match is in documentation showing how to install the skill's own PyPI package.
Detects pip install of arbitrary packages that modify the host environment
pip install sc Pin all pip packages to exact versions (e.g., pip install package==1.2.3). Use a requirements.txt or pyproject.toml with pinned versions and hash verification.
Likely FP if the match is in documentation showing how to install the skill's own PyPI package.
Detects pip install of arbitrary packages that modify the host environment
pip install pr Pin all pip packages to exact versions (e.g., pip install package==1.2.3). Use a requirements.txt or pyproject.toml with pinned versions and hash verification.
Likely FP if the match is in documentation showing how to install the skill's own PyPI package.