
Escalating privileges in Google Cloud, from app to cloud access
A short blogpost that shows an exploitation scenario where an attacker, who has managed to gain SSRF or code execution capabilities, can leak tokens and escape to the Google Cloud platform.