Skip to main content

Documentation Index

Fetch the complete documentation index at: https://hydroxai.mintlify.app/llms.txt

Use this file to discover all available pages before exploring further.

What is SSRF?

Server-Side Request Forgery (SSRF) occurs when an attacker tricks an AI system’s server-side components into making HTTP requests to unintended destinations — typically internal services, cloud metadata endpoints, or other resources that are not directly accessible from the outside. AI systems with web browsing, URL fetching, or tool-use capabilities are particularly vulnerable.

Why It Matters

SSRF is especially dangerous in AI systems because:
  • Cloud metadata access — Attackers can reach cloud metadata endpoints (169.254.169.254) to steal IAM credentials and API keys.
  • Internal network scanning — AI backends often run within trusted network zones with access to internal services.
  • Service impersonation — Requests from the AI server are trusted by internal services, bypassing firewalls and ACLs.
  • AI tool chains — AI agents that fetch URLs, process documents, or call APIs create numerous SSRF opportunities.
  • Data exfiltration — Internal data can be exfiltrated by directing the AI to send it to attacker-controlled servers.

How the Attack Works

Direct URL Manipulation

Tricking the AI into fetching internal URLs:

Redirect-Based SSRF

Using external redirects to reach internal targets:
  • Providing a URL that redirects to an internal address
  • Using URL shorteners that resolve to internal IPs
  • Crafting DNS rebinding attacks

AI Tool Exploitation

Exploiting AI agent tools that make network requests:
  • Injecting internal URLs into tool parameters
  • Using the AI’s web browsing capability to scan internal networks
  • Providing documents with embedded links to internal resources

Example Scenarios

ScenarioRisk
AI web browser tool fetches cloud metadata endpoint, leaking IAM credentialsFull cloud account compromise
AI document processor follows links to internal admin panelsInternal system access
URL summarization feature is used to scan internal network portsNetwork reconnaissance
AI agent’s API-calling tool is directed to internal microservicesService-to-service exploitation

Mitigation Strategies

  • URL allowlisting — Only allow AI systems to fetch URLs from approved domains
  • Network segmentation — Isolate AI workloads from internal networks and cloud metadata endpoints
  • Cloud metadata protection — Use IMDSv2 or block metadata endpoint access from AI containers
  • DNS resolution validation — Resolve URLs and verify they don’t point to internal/private IP ranges
  • Protocol restrictions — Only allow HTTP/HTTPS; block file://, gopher://, and other protocols
  • Request monitoring — Log and alert on all outbound requests from AI systems
  • SSRF testing — Use Know Your AI to test for SSRF across all URL-accepting inputs and tools