building-mcp-server-on-cloudflare
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- REMOTE_CODE_EXECUTION (HIGH): The skill provides a 'copy-paste' code example for a database tool that is vulnerable to SQL injection.
- Evidence: In
SKILL.md, thequery_dbtool implementation:this.env.DB.prepare(sql).all(). This takes a raw stringsqldirectly from the tool input and executes it against the Cloudflare D1 database. - Ingestion points: The
sqlparameter in thequery_dbtool definition. - Boundary markers: Absent; the input is interpolated directly into the database execution context.
- Capability inventory: Full read/write access to the linked Cloudflare D1 database.
- Sanitization: Absent; it relies only on a Zod string type check, which does not prevent malicious SQL commands.
- EXTERNAL_DOWNLOADS (MEDIUM): The skill instructs users to download and execute templates from external repositories that are not on the pre-approved trusted list.
- Evidence:
SKILL.mdandreferences/examples.mdsuggest usingnpm create cloudflare@latestwith templates such ascloudflare/ai/demos/remote-mcp-github-oauth. - Status: While Cloudflare is a known entity, it is not within the specified [TRUST-SCOPE-RULE] organizations, elevating this from LOW to MEDIUM due to the 'npm create' execution pattern.
- COMMAND_EXECUTION (LOW): The skill requires the execution of multiple CLI tools and local servers to function.
- Evidence: Frequent use of
npm start,npx wrangler deploy, andnpx @modelcontextprotocol/inspector@latest. - Context: These are standard development workflows for the Cloudflare platform, but they involve running arbitrary code from the npm registry.
Recommendations
- AI detected serious security threats
Audit Metadata