cloudflare-python-workers
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFE
Full Analysis
- [PROMPT_INJECTION]: Technical instructions guide the agent toward modern Cloudflare patterns, such as the WorkerEntrypoint class. An indirect prompt injection surface is present where templates process external data from HTTP requests or workflow payloads.
- Ingestion points: 'templates/workflow-example.py' (event payload) and 'templates/src/entry.py' (request objects).
- Boundary markers: Absent in provided templates.
- Capability inventory: Network access via 'fetch' and access to Cloudflare storage bindings (D1, KV, R2).
- Sanitization: Absent in base templates.
- [EXTERNAL_DOWNLOADS]: The skill references official Cloudflare tools including 'workers-py', 'workers-runtime-sdk', and 'wrangler' from trusted sources.
- [COMMAND_EXECUTION]: The skill provides standard commands for project initialization and deployment using the 'uv' and 'pywrangler' CLI tools.
Audit Metadata