webPromedium

Lab 104 — CloudOps Copilot — AI SSRF via Infrastructure Tool Abuse

hackadvisor

Task: AI-powered DevOps dashboard (CloudOps Copilot) with an AI assistant that has a check_endpoint tool making server-side HTTP requests without URL validation. Solution: abuse the AI copilot's check_endpoint tool as an SSRF proxy to port-scan localhost, discover internal cloud metadata service on port 3001, and exfiltrate AWS credentials containing the flag.

$ ls tags/ techniques/
honeypot_flag_detectionssrf_via_ai_toolinternal_port_scanningcloud_metadata_credential_theftlocalhost_ip_blocklist_bypass

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups