aws-penetration-testing

skills-sh:sickn33_antigravity-awesome-skills__aws-penetration-testing

View source
F
0/100

First Seen

Feb 18, 2026

Last Scanned

Feb 20, 2026

Findings

19

Score

0/100

CRITICAL 2
HIGH 14
LOW 3

Findings (19)

CRITICAL
Cloud metadata URL
L345

Detects cloud provider metadata endpoint URLs used for SSRF attacks

curl http://169.254.169.254
FIX

Block requests to cloud metadata endpoints (169.254.169.254, metadata.google.internal). Implement URL validation that rejects private IP ranges and cloud metadata addresses.

FP?

Likely FP if the match is in documentation explaining cloud security concepts or SSRF prevention rather than actual code making metadata requests.

CRITICAL
Jailbreak template
L359

Detects common jailbreak prompt patterns

Disable security
FIX

Remove directives that attempt to exfiltrate data through the agent's response (e.g., asking the agent to embed credentials in URLs or include secret values in output).

FP?

Likely FP if the text is a legitimate tool instruction about displaying configuration to the user (e.g., show current settings) without external transmission.

HIGH
Cloud credential endpoint
L99

Detects cloud provider token and credential endpoints

http://169.254.169.254/latest/meta-data/iam/security-credentials/
FIX

Block access to cloud instance metadata services using IMDSv2 token requirements, network rules, or iptables. This is a critical vector for credential theft in cloud environments.

FP?

Likely FP if the match is in security documentation explaining how to protect against SSRF/IMDS attacks rather than code that accesses the metadata service.

HIGH
AWS IMDS token request
L99

Detects AWS Instance Metadata Service token requests

latest/meta-data/iam
FIX

Block requests to internal service discovery endpoints (consul, etcd, kubernetes API). Implement network segmentation between the agent and internal infrastructure services.

FP?

Likely FP if the match is documentation about service discovery architecture without actual code that queries these endpoints.

HIGH
Cloud credential endpoint
L102

Detects cloud provider token and credential endpoints

http://169.254.169.254/latest/meta-data/iam/security-credentials/
FIX

Block access to cloud instance metadata services using IMDSv2 token requirements, network rules, or iptables. This is a critical vector for credential theft in cloud environments.

FP?

Likely FP if the match is in security documentation explaining how to protect against SSRF/IMDS attacks rather than code that accesses the metadata service.

HIGH
AWS IMDS token request
L102

Detects AWS Instance Metadata Service token requests

latest/meta-data/iam
FIX

Block requests to internal service discovery endpoints (consul, etcd, kubernetes API). Implement network segmentation between the agent and internal infrastructure services.

FP?

Likely FP if the match is documentation about service discovery architecture without actual code that queries these endpoints.

HIGH
AWS IMDS token request
L117

Detects AWS Instance Metadata Service token requests

X-aws-ec2-metadata-token
FIX

Block requests to internal service discovery endpoints (consul, etcd, kubernetes API). Implement network segmentation between the agent and internal infrastructure services.

FP?

Likely FP if the match is documentation about service discovery architecture without actual code that queries these endpoints.

HIGH
AWS IMDS token request
L118

Detects AWS Instance Metadata Service token requests

latest/api/token
FIX

Block requests to internal service discovery endpoints (consul, etcd, kubernetes API). Implement network segmentation between the agent and internal infrastructure services.

FP?

Likely FP if the match is documentation about service discovery architecture without actual code that queries these endpoints.

HIGH
AWS IMDS token request
L121

Detects AWS Instance Metadata Service token requests

X-aws-ec2-metadata-token
FIX

Block requests to internal service discovery endpoints (consul, etcd, kubernetes API). Implement network segmentation between the agent and internal infrastructure services.

FP?

Likely FP if the match is documentation about service discovery architecture without actual code that queries these endpoints.

HIGH
AWS IMDS token request
L122

Detects AWS Instance Metadata Service token requests

latest/meta-data/iam
FIX

Block requests to internal service discovery endpoints (consul, etcd, kubernetes API). Implement network segmentation between the agent and internal infrastructure services.

FP?

Likely FP if the match is documentation about service discovery architecture without actual code that queries these endpoints.

HIGH
Cloud credential endpoint
L122

Detects cloud provider token and credential endpoints

http://169.254.169.254/latest/meta-data/iam/security-credentials/
FIX

Block access to cloud instance metadata services using IMDSv2 token requirements, network rules, or iptables. This is a critical vector for credential theft in cloud environments.

FP?

Likely FP if the match is in security documentation explaining how to protect against SSRF/IMDS attacks rather than code that accesses the metadata service.

HIGH
Cloud metadata URL
L133

Detects cloud provider metadata endpoint URLs used for SSRF attacks

http://169.254.170.2
FIX

Block requests to cloud metadata endpoints (169.254.169.254, metadata.google.internal). Implement URL validation that rejects private IP ranges and cloud metadata addresses.

FP?

Likely FP if the match is in documentation explaining cloud security concepts or SSRF prevention rather than actual code making metadata requests.

HIGH
Cloud credential endpoint
L374

Detects cloud provider token and credential endpoints

https://app.com/proxy?url=http://169.254.169.254/latest/meta-data/iam/security-credentials/
FIX

Block access to cloud instance metadata services using IMDSv2 token requirements, network rules, or iptables. This is a critical vector for credential theft in cloud environments.

FP?

Likely FP if the match is in security documentation explaining how to protect against SSRF/IMDS attacks rather than code that accesses the metadata service.

HIGH
AWS IMDS token request
L374

Detects AWS Instance Metadata Service token requests

latest/meta-data/iam
FIX

Block requests to internal service discovery endpoints (consul, etcd, kubernetes API). Implement network segmentation between the agent and internal infrastructure services.

FP?

Likely FP if the match is documentation about service discovery architecture without actual code that queries these endpoints.

HIGH
AWS IMDS token request
L378

Detects AWS Instance Metadata Service token requests

latest/meta-data/iam
FIX

Block requests to internal service discovery endpoints (consul, etcd, kubernetes API). Implement network segmentation between the agent and internal infrastructure services.

FP?

Likely FP if the match is documentation about service discovery architecture without actual code that queries these endpoints.

HIGH
Cloud credential endpoint
L378

Detects cloud provider token and credential endpoints

https://app.com/proxy?url=http://169.254.169.254/latest/meta-data/iam/security-credentials/
FIX

Block access to cloud instance metadata services using IMDSv2 token requirements, network rules, or iptables. This is a critical vector for credential theft in cloud environments.

FP?

Likely FP if the match is in security documentation explaining how to protect against SSRF/IMDS attacks rather than code that accesses the metadata service.

LOW
pip install arbitrary package
L39

Detects pip install of arbitrary packages that modify the host environment

pip install pr
FIX

Pin all pip packages to exact versions (e.g., pip install package==1.2.3). Use a requirements.txt or pyproject.toml with pinned versions and hash verification.

FP?

Likely FP if the match is in documentation showing how to install the skill's own PyPI package.

LOW
pip install arbitrary package
L40

Detects pip install of arbitrary packages that modify the host environment

pip install sc
FIX

Pin all pip packages to exact versions (e.g., pip install package==1.2.3). Use a requirements.txt or pyproject.toml with pinned versions and hash verification.

FP?

Likely FP if the match is in documentation showing how to install the skill's own PyPI package.

LOW
pip install arbitrary package
L42

Detects pip install of arbitrary packages that modify the host environment

pip install pr
FIX

Pin all pip packages to exact versions (e.g., pip install package==1.2.3). Use a requirements.txt or pyproject.toml with pinned versions and hash verification.

FP?

Likely FP if the match is in documentation showing how to install the skill's own PyPI package.