cloudflare-python-workers

Warn

Audited by Snyk on Feb 15, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The workflow-example.py fetch_data step (templates/workflow-example.py) takes a URL from the workflow payload (payload.get("url")) and performs await fetch(url) / await response.json(), which clearly ingests and interprets content from arbitrary external/public URLs (untrusted third-party sources).
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 15, 2026, 08:08 PM