agents-sdk
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [Dynamic Execution] (HIGH): The skill documentation explicitly promotes 'Code Mode,' which generates and executes JavaScript at runtime to replace tool calls. This introduces a significant risk if the generating model is influenced by untrusted input, potentially leading to arbitrary code execution within the Cloudflare Worker environment.
- [Indirect Prompt Injection] (HIGH):
- Ingestion points: Untrusted data enters via
onChatMessagein theAIChatAgentimplementation. - Boundary markers: None identified in the provided documentation or code examples.
- Capability inventory: The agent has capabilities for SQL execution (
this.sql), task scheduling (this.schedule), and dynamic code execution ('Code Mode'). - Sanitization: No evidence of input sanitization or output validation is provided, creating a path for attackers to escalate chat-based instructions into database or system operations.
- [Data Exposure & Exfiltration] (MEDIUM): The use of
this.sqltemplate literals for database queries provides a direct interface to underlying storage. While typical Cloudflare drivers parameterize these, the lack of explicit schema enforcement or validation at the SDK layer poses a risk of unauthorized data exposure if exploited via prompt injection. - [Metadata Poisoning] (LOW): An automated scanner flagged
this.caas a malicious URL. Analysis indicates this is a false positive triggered by the method stringthis.cancelSchedule(id)being misinterpreted as a domain.
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata