pentest-commands

skills-sh:sickn33_antigravity-awesome-skills__pentest-commands

View source
D
28/100

First Seen

Feb 18, 2026

Last Scanned

Feb 20, 2026

Findings

10

Score

28/100

MEDIUM 9
LOW 1

Findings (10)

MEDIUM
Internal IP range access
L265

Detects references to private/internal IP ranges in URL context

http://192.168.1.1/
FIX

Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.

FP?

Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.

MEDIUM
Internal IP range access
L268

Detects references to private/internal IP ranges in URL context

http://192.168.1.1/
FIX

Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.

FP?

Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.

MEDIUM
Internal IP range access
L271

Detects references to private/internal IP ranges in URL context

http://192.168.1.1/
FIX

Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.

FP?

Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.

MEDIUM
Internal IP range access
L274

Detects references to private/internal IP ranges in URL context

http://192.168.1.1/
FIX

Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.

FP?

Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.

MEDIUM
Internal IP range access
L277

Detects references to private/internal IP ranges in URL context

http://192.168.1.1/
FIX

Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.

FP?

Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.

MEDIUM
Internal IP range access
L280

Detects references to private/internal IP ranges in URL context

http://192.168.1.1/
FIX

Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.

FP?

Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.

MEDIUM
Internal IP range access
L283

Detects references to private/internal IP ranges in URL context

http://192.168.1.1/
FIX

Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.

FP?

Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.

MEDIUM
Internal IP range access
L286

Detects references to private/internal IP ranges in URL context

http://192.168.1.1/
FIX

Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.

FP?

Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.

MEDIUM
Internal IP range access
L289

Detects references to private/internal IP ranges in URL context

http://192.168.1.1/
FIX

Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.

FP?

Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.

LOW
Runtime URL controlling behavior
L428

Detects URLs fetched at runtime that control or influence agent behavior without pinning

get && sqlmap -u "http:// + rules
FIX

Avoid loading configuration or behavior-controlling content from runtime URLs. Bundle required configurations locally or pin remote config to versioned, integrity-verified endpoints.

FP?

Likely FP if the URL in the match is a documentation link or example URL (e.g., example.com) rather than an actual runtime-fetched configuration endpoint.