cloudflare-kv
Warn
Audited by Socket on Feb 15, 2026
1 alert found:
AnomalyAnomalytemplates/kv-list-pagination.ts
LOWAnomalyLOW
templates/kv-list-pagination.ts
This module itself does not contain obfuscated or explicitly malicious code (no eval, no external exfiltration), but it creates significant security risk if deployed as-is because it exposes read and destructive KV operations over unauthenticated HTTP endpoints. The primary issues are lack of authentication/authorization, potential for data leakage (export endpoint returns values), and resource exhaustion from unbounded pagination/aggregation. Recommend adding access control (authentication, role checks), rate limiting, response size limits, and safer deletion safeguards (confirmation, dry-run, or restricted to admin scopes) before use in production.
Confidence: 90%Severity: 60%
Audit Metadata