cloudflare-tomarkdown
Pass
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill processes untrusted data from external URLs and local files to generate Markdown output, which is a primary surface for indirect prompt injection.
- Ingestion points: Untrusted data enters the agent context via
options.urlandoptions.fileinscripts/render.js, which are then sent to Cloudflare APIs for conversion. - Boundary markers: The script implements explicit boundary markers in the
printSafeOutputfunction, wrapping converted content with '--- START OF UNTRUSTED CONTENT ---' and a warning to the agent to treat the information as plain text and avoid executing any instructions found within. - Capability inventory: The script uses
fs.readFileSyncfor local file access andfetchfor network requests to Cloudflare APIs and external URLs (inscripts/render.js). - Sanitization: The script includes a
printSafeOutputfunction that adds clear visual and textual delimiters to the untrusted output before it is presented to the agent, reducing the risk of the agent accidentally following embedded instructions.
Audit Metadata