cloudflare-r2
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill references several external dependencies including
aws4fetch,@aws-sdk/client-s3, and thewranglerCLI. - These are well-known and trusted resources within the Cloudflare and AWS ecosystems.
- While some version numbers (e.g.,
wrangler@4.59.2) appear to be forward-dated or non-existent, the sources are reputable official registries. - [COMMAND_EXECUTION]: The documentation provides numerous CLI commands for managing R2 storage.
- Commands such as
npx wrangler r2 bucket createandwrangler r2 object putare standard development operations. - The instructions correctly identify that these commands should be used in a secure environment with appropriate API token permissions.
- [PROMPT_INJECTION]: The skill describes an attack surface for indirect prompt injection through its data processing templates.
- Ingestion points: Untrusted data enters the application via
c.req.formData()andc.req.arrayBuffer()in the provided Hono worker templates (found incommon-patterns.mdandtemplates/r2-simple-upload.ts). - Boundary markers: There are no explicit delimiters or system instructions in the templates to prevent an LLM from executing malicious commands found within the retrieved objects.
- Capability inventory: The skill provides full administrative capabilities for R2 buckets, including
put,get,delete, andlistacross all scripts. - Sanitization: The templates implement basic file validation (MIME type checks and UUID-based key generation) but do not perform deep content inspection or sanitization of the object bodies.
Audit Metadata