cloud-penetration-testing

skills-sh:sickn33_antigravity-awesome-skills__cloud-penetration-testing

View source
F
0/100

First Seen

Feb 18, 2026

Last Scanned

Feb 20, 2026

Findings

17

Score

0/100

CRITICAL 3
HIGH 11
LOW 3

Findings (17)

CRITICAL
Cloud metadata URL
L381

Detects cloud provider metadata endpoint URLs used for SSRF attacks

curl http://169.254.169.254
FIX

Block requests to cloud metadata endpoints (169.254.169.254, metadata.google.internal). Implement URL validation that rejects private IP ranges and cloud metadata addresses.

FP?

Likely FP if the match is in documentation explaining cloud security concepts or SSRF prevention rather than actual code making metadata requests.

CRITICAL
Cloud metadata URL
L393

Detects cloud provider metadata endpoint URLs used for SSRF attacks

http://metadata.google.internal
FIX

Block requests to cloud metadata endpoints (169.254.169.254, metadata.google.internal). Implement URL validation that rejects private IP ranges and cloud metadata addresses.

FP?

Likely FP if the match is in documentation explaining cloud security concepts or SSRF prevention rather than actual code making metadata requests.

CRITICAL
Cloud metadata URL
L401

Detects cloud provider metadata endpoint URLs used for SSRF attacks

http://metadata.google.internal
FIX

Block requests to cloud metadata endpoints (169.254.169.254, metadata.google.internal). Implement URL validation that rejects private IP ranges and cloud metadata addresses.

FP?

Likely FP if the match is in documentation explaining cloud security concepts or SSRF prevention rather than actual code making metadata requests.

HIGH
Download-and-execute
L25

Detects patterns of downloading and piping to shell execution

curl "https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip" -o "awscliv2.zip"
unzip awscliv2.zip && sudo ./aws/install

# GCP CLI
curl https://sdk.cloud.google.com | bash
FIX

Download the file first, verify its integrity (checksum, signature), inspect it, then run it. Prefer package managers over raw downloads. Never fetch-and-run in one step.

FP?

Likely FP if the target is a well-known installer (e.g., rustup, Homebrew) from its canonical HTTPS domain, though the pattern is inherently risky.

HIGH
Curl or wget piped to shell
L25

Detects downloading scripts piped directly to a shell interpreter

curl "https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip" -o "awscliv2.zip"
unzip awscliv2.zip && sudo ./aws/install

# GCP CLI
curl https://sdk.cloud.google.com | bash
FIX

Download the script first, inspect it, verify its checksum, then run it. Do not pipe curl/wget output directly to sh/bash. Prefer package manager installs.

FP?

Likely FP if the download is from a well-known installer domain (e.g., brew.sh, rustup.rs), though this pattern is inherently risky even with trusted sources.

HIGH
Cloud metadata URL
L261

Detects cloud provider metadata endpoint URLs used for SSRF attacks

curl http://169.254.169.254
FIX

Block requests to cloud metadata endpoints (169.254.169.254, metadata.google.internal). Implement URL validation that rejects private IP ranges and cloud metadata addresses.

FP?

Likely FP if the match is in documentation explaining cloud security concepts or SSRF prevention rather than actual code making metadata requests.

HIGH
AWS IMDS token request
L262

Detects AWS Instance Metadata Service token requests

latest/meta-data/iam
FIX

Block requests to internal service discovery endpoints (consul, etcd, kubernetes API). Implement network segmentation between the agent and internal infrastructure services.

FP?

Likely FP if the match is documentation about service discovery architecture without actual code that queries these endpoints.

HIGH
Cloud credential endpoint
L262

Detects cloud provider token and credential endpoints

http://169.254.169.254/latest/meta-data/iam/security-credentials/
FIX

Block access to cloud instance metadata services using IMDSv2 token requirements, network rules, or iptables. This is a critical vector for credential theft in cloud environments.

FP?

Likely FP if the match is in security documentation explaining how to protect against SSRF/IMDS attacks rather than code that accesses the metadata service.

HIGH
Cloud metadata URL
L262

Detects cloud provider metadata endpoint URLs used for SSRF attacks

curl http://169.254.169.254
FIX

Block requests to cloud metadata endpoints (169.254.169.254, metadata.google.internal). Implement URL validation that rejects private IP ranges and cloud metadata addresses.

FP?

Likely FP if the match is in documentation explaining cloud security concepts or SSRF prevention rather than actual code making metadata requests.

HIGH
AWS IMDS token request
L265

Detects AWS Instance Metadata Service token requests

X-aws-ec2-metadata-token
FIX

Block requests to internal service discovery endpoints (consul, etcd, kubernetes API). Implement network segmentation between the agent and internal infrastructure services.

FP?

Likely FP if the match is documentation about service discovery architecture without actual code that queries these endpoints.

HIGH
Cloud metadata URL
L266

Detects cloud provider metadata endpoint URLs used for SSRF attacks

curl http://169.254.169.254
FIX

Block requests to cloud metadata endpoints (169.254.169.254, metadata.google.internal). Implement URL validation that rejects private IP ranges and cloud metadata addresses.

FP?

Likely FP if the match is in documentation explaining cloud security concepts or SSRF prevention rather than actual code making metadata requests.

HIGH
AWS IMDS token request
L266

Detects AWS Instance Metadata Service token requests

X-aws-ec2-metadata-token
FIX

Block requests to internal service discovery endpoints (consul, etcd, kubernetes API). Implement network segmentation between the agent and internal infrastructure services.

FP?

Likely FP if the match is documentation about service discovery architecture without actual code that queries these endpoints.

HIGH
Cloud metadata URL
L337

Detects cloud provider metadata endpoint URLs used for SSRF attacks

http://metadata.google.internal
FIX

Block requests to cloud metadata endpoints (169.254.169.254, metadata.google.internal). Implement URL validation that rejects private IP ranges and cloud metadata addresses.

FP?

Likely FP if the match is in documentation explaining cloud security concepts or SSRF prevention rather than actual code making metadata requests.

HIGH
Cloud metadata URL
L340

Detects cloud provider metadata endpoint URLs used for SSRF attacks

http://metadata.google.internal
FIX

Block requests to cloud metadata endpoints (169.254.169.254, metadata.google.internal). Implement URL validation that rejects private IP ranges and cloud metadata addresses.

FP?

Likely FP if the match is in documentation explaining cloud security concepts or SSRF prevention rather than actual code making metadata requests.

LOW
Chained shell command execution
L25

Detects chained commands using shell operators with dangerous operations

curl "https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip" -o "awscliv2.zip"
unzip awscliv2.zip && sudo ./aws/install

# GCP CLI
curl https://sdk.cloud.google.com | bash
FIX

Break chained commands into discrete, individually validated steps. Avoid piping untrusted output directly into a shell interpreter.

FP?

Likely FP if the matched text is a documentation example showing a common installer one-liner for a well-known tool with a canonical URL.

LOW
Download binary or archive from URL
L25

Detects downloading binary, archive, or installer files from remote URLs

curl "https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip
FIX

Verify the integrity of downloaded binaries or archives using SHA-256 checksums or GPG signatures. Pin download URLs to specific versions and avoid fetching from unverified sources.

FP?

Likely FP if the download is from github.com or githubusercontent.com for a specific tagged release with documented checksums.

LOW
pip install arbitrary package
L33

Detects pip install of arbitrary packages that modify the host environment

pip install sc
FIX

Pin all pip packages to exact versions (e.g., pip install package==1.2.3). Use a requirements.txt or pyproject.toml with pinned versions and hash verification.

FP?

Likely FP if the match is in documentation showing how to install the skill's own PyPI package.