cloudflare-vpc-services
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- EXTERNAL_DOWNLOADS (LOW): The skill's utility scripts use
npx wranglerwithout version pinning to execute management tasks. This results in the remote download and execution of a package from the npm registry. Although 'wrangler' is the standard tool for Cloudflare Workers, the use ofnpxwith an unpinned version for an organization not on the strict trusted list (Cloudflare) constitutes a vulnerability. Severity is lowered from MEDIUM as it is central to the skill's primary function. - COMMAND_EXECUTION (LOW): The skill utilizes the
Bashtool to execute provided scripts for Cloudflare configuration and management. These scripts are benign wrappers but represent a capability for local system interaction. - PROMPT_INJECTION (LOW): Ingesting log data via
tail-worker.shfor troubleshooting creates an indirect prompt injection surface (Category 8). \n 1. Ingestion points: Log stream fromwrangler tailand localwrangler.jsoncfiles. \n 2. Boundary markers: Absent; there are no instructions to the agent to treat this data as untrusted or delimited. \n 3. Capability inventory:Bash,WebFetch,Grep,Glob, andReadtools are available. \n 4. Sanitization: Absent; the agent processes log data directly, which could contain malicious instructions embedded by an attacker-controlled Worker.
Audit Metadata