cf-proxy

Fail

Audited by Snyk on May 7, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill explicitly says it will collect Cloudflare credentials and produce deployment configs and the final VLESS connection URI (including generated UUID/admin password), which requires the agent to include secret values verbatim in commands/configs and outputs.

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (medium risk: 0.65). The GitHub repo is from an unfamiliar user and likely contains scripts that download/execute code and automate domain binding (which can hide malicious payloads), and the placeholder "your-domain" could represent an attacker-controlled endpoint — while GitHub is legitimate, running unreviewed repo scripts is risky.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's required workflow explicitly downloads and deploys edgetunnel code from a public GitHub repository ("Downloads edgetunnel — fetches the worker code from GitHub (cmliu/edgetunnel)"), meaning it ingests untrusted third‑party content that can change runtime behavior when executed or deployed.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Issues (4)

W007
HIGH

Insecure credential handling detected in skill instructions.

E005
CRITICAL

Suspicious download URL detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
CRITICAL
Analyzed
May 7, 2026, 04:59 AM
Issues
4