cloudflare-turnstile
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION] (LOW): The script
scripts/check-csp.shexecutes thecurlcommand using a user-provided URL. While the script's logic is limited to fetching and parsing HTTP headers, the ability to execute network commands on arbitrary inputs is a security consideration for the agent. - [DATA_EXFILTRATION] (LOW): The utility script
scripts/check-csp.shperforms network operations to non-whitelisted domains (based on user input). However, no sensitive data access was found in conjunction with these operations. - [INDIRECT_PROMPT_INJECTION] (LOW): The skill has an attack surface where it processes data from untrusted external sources (HTTP headers).
- Ingestion points:
scripts/check-csp.shfetches and parses headers from external URLs. - Boundary markers: Absent.
- Capability inventory:
curlexecution and header parsing. - Sanitization: Absent; the script uses
grepandsedon the raw output of thecurlcommand. - [EXTERNAL_DOWNLOADS] (SAFE): The skill references the
@marsidev/react-turnstileandturnstile-typespackages. These are standard, well-known libraries for Turnstile integration and do not involve suspicious remote execution. - [CREDENTIALS_UNSAFE] (SAFE): The skill includes hardcoded keys in
templates/turnstile-test-config.ts(e.g.,1x00000000000000000000AA). These are officially documented public test keys provided by Cloudflare for development and do not constitute a secret leak.
Audit Metadata