building-ai-agent-on-cloudflare
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (MEDIUM): The documentation instructs users to execute code and bootstrap projects using
npm create cloudflare@latestandnpx wrangler deploy. These tools pull code from the 'cloudflare' organization on GitHub/NPM, which is not included in the predefined list of trusted organizations. This constitutes an unverifiable dependency risk. - [EXTERNAL_DOWNLOADS] (MEDIUM): An automated scan flagged the domain
this.caas malicious. This appears to be a false positive triggered by the presence of the code substringthis.cancelScheduleorthis.callbackin the reference files, but the finding is recorded due to the blacklist match. - [PROMPT_INJECTION] (LOW): The skill demonstrates agent patterns that are vulnerable to indirect prompt injection. User messages are directly interpolated into the AI context, which has access to powerful capabilities.
- Ingestion points: The
onMessagehandler inSKILL.mdand theonChatMessagemethod in theAIChatAgentexample. - Boundary markers: None are used in the code examples to separate user instructions from system prompts.
- Capability inventory: The agent instances have access to
this.sql(SQLite database),this.schedule(task scheduling), andthis.setState(persistent state management). - Sanitization: No input validation or sanitization logic is provided in the reference implementations.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata