cloudflare-mcp-server
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The installation instructions direct the user to clone a repository from an untrusted GitHub account (
https://github.com/jezweb/claude-skills) and execute a shell script (./scripts/install-skill.sh). This pattern allows for arbitrary code execution on the user's system.- [EXTERNAL_DOWNLOADS] (MEDIUM): The skill promotes the use of several external tools and templates vianpm create cloudflare@latestandnpx @modelcontextprotocol/inspector. These external sources are not part of the trusted organization list and result in runtime code fetching.- [COMMAND_EXECUTION] (LOW): The documentation contains multiple commands for building and deploying workers (npm install,wrangler deploy). These are consistent with the skill's purpose but involve high-privilege operations in a developer environment.
Audit Metadata