cloudflare-workflows
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface by processing untrusted data via
event.payloadand external webhook responses (e.g., intemplates/basic-workflow.tsandtemplates/workflow-with-events.ts). This data is subsequently utilized in downstream operations such asfetch()calls and database queries. * Ingestion points:event.payloadinBasicWorkflow.runand webhook data inApprovalWorkflow.run. * Boundary markers: Not utilized in the templates. * Capability inventory: Extensive use offetch()for network operations andenv.DBfor data persistence across template files. * Sanitization: No explicit sanitization or validation logic is implemented in the example templates. - [DATA_EXFILTRATION]: Template files contain
fetch()operations targeting external placeholder domains likeapi.example.comandprocessor.example.com. While these represent communication with non-whitelisted domains, they are used as examples for external service integration and do not involve access to sensitive local files, credentials, or system environment variables. - [EXTERNAL_DOWNLOADS]: The skill documentation references the installation of development dependencies including
wrangler,@cloudflare/workers-types, andvitest. These packages are official components of the Cloudflare Workers ecosystem and originate from a trusted organization, making them safe for their intended use in building and testing workflows.
Audit Metadata