cloudflare-kv
Audited by Socket on Apr 29, 2026
2 alerts found:
AnomalySecurityThis module itself does not contain obfuscated or explicitly malicious code (no eval, no external exfiltration), but it creates significant security risk if deployed as-is because it exposes read and destructive KV operations over unauthenticated HTTP endpoints. The primary issues are lack of authentication/authorization, potential for data leakage (export endpoint returns values), and resource exhaustion from unbounded pagination/aggregation. Recommend adding access control (authentication, role checks), rate limiting, response size limits, and safer deletion safeguards (confirmation, dry-run, or restricted to admin scopes) before use in production.
No clear evidence of injected malware/backdoors in this module (no obfuscation or typical malicious runtime behaviors). However, the security posture is poor: a hardcoded login secret enables trivial authentication, admin endpoints are completely unauthenticated and can enumerate/revoke other users’ sessions, analytics read is publicly accessible (user activity disclosure), and session updates accept arbitrary JSON without validation (mass assignment). If used in production, this represents a substantial authorization and information disclosure risk despite lacking overt malware characteristics.