cloudflare-manager
Fail
Audited by Gen Agent Trust Hub on Feb 23, 2026
Risk Level: HIGHCOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The update_ingress function in scripts/cf_manager.py uses sudo tee to write to /etc/cloudflared/config.yml and sudo systemctl to restart the service, providing root-level modification capabilities.
- [CREDENTIALS_UNSAFE] (MEDIUM): The skill processes sensitive CLOUDFLARE_API_TOKEN environment variables and accesses system configuration files in /etc/cloudflared/.
- [PROMPT_INJECTION] (LOW): The skill is vulnerable to indirect prompt injection. 1. Ingestion points: hostname and service arguments in scripts/cf_manager.py. 2. Boundary markers: Absent. 3. Capability inventory: sudo file-write and service restart. 4. Sanitization: Uses yaml.dump for structural integrity but lacks content validation.
- [EXTERNAL_DOWNLOADS] (SAFE): Standard dependencies requests and PyYAML are installed from PyPI via pip.
Recommendations
- AI detected serious security threats
Audit Metadata