building-mcp-server-on-cloudflare
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (MEDIUM): The skill instructs users to download and execute code templates from the
cloudflareGitHub organization (cloudflare/ai/demos/). As 'cloudflare' is not included in the 'Trusted GitHub Organizations' list, this constitutes an unverifiable remote dependency. - [EXTERNAL_DOWNLOADS] (MEDIUM): The skill references the
@modelcontextprotocol/inspectorpackage and imports fromagents/mcp. The latter is not provided within the skill package, and the 'modelcontextprotocol' organization is not in the trusted whitelist. - [COMMAND_EXECUTION] (LOW): The skill utilizes
npm,npx, and thewranglerCLI for setup, local development, and deployment. - [PROMPT_INJECTION] (LOW): Category 8: Indirect Prompt Injection surface. The
query_dbtool example demonstrates an unsafe pattern by accepting raw SQL strings. - Ingestion points: The
sqlargument in thequery_dbtool defined inSKILL.md. - Boundary markers: Absent; the tool accepts free-text strings without delimiters or validation.
- Capability inventory: Full read/write access to the Cloudflare D1 database via
this.env.DB.prepare(sql).all(). - Sanitization: Absent; the documentation provides an example that avoids parameterized queries, making it vulnerable to exploitation by malicious user inputs.
Audit Metadata