cloudflare-python-workers
Warn
Audited by Snyk on Feb 15, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The workflow-example.py fetch_data step (templates/workflow-example.py) takes a URL from the workflow payload (payload.get("url")) and performs await fetch(url) / await response.json(), which clearly ingests and interprets content from arbitrary external/public URLs (untrusted third-party sources).
Audit Metadata