cloudflare-kv

Warn

Audited by Socket on Apr 29, 2026

2 alerts found:

AnomalySecurity
AnomalyLOW
templates/kv-list-pagination.ts

This module itself does not contain obfuscated or explicitly malicious code (no eval, no external exfiltration), but it creates significant security risk if deployed as-is because it exposes read and destructive KV operations over unauthenticated HTTP endpoints. The primary issues are lack of authentication/authorization, potential for data leakage (export endpoint returns values), and resource exhaustion from unbounded pagination/aggregation. Recommend adding access control (authentication, role checks), rate limiting, response size limits, and safer deletion safeguards (confirmation, dry-run, or restricted to admin scopes) before use in production.

Confidence: 90%Severity: 60%
SecurityMEDIUM
examples/session-management/index.ts

No clear evidence of injected malware/backdoors in this module (no obfuscation or typical malicious runtime behaviors). However, the security posture is poor: a hardcoded login secret enables trivial authentication, admin endpoints are completely unauthenticated and can enumerate/revoke other users’ sessions, analytics read is publicly accessible (user activity disclosure), and session updates accept arbitrary JSON without validation (mass assignment). If used in production, this represents a substantial authorization and information disclosure risk despite lacking overt malware characteristics.

Confidence: 78%Severity: 90%
Audit Metadata
Analyzed At
Apr 29, 2026, 02:30 PM
Package URL
pkg:socket/skills-sh/secondsky%2Fclaude-skills%2Fcloudflare-kv%2F@e69d4bc426015e03438251fb56f224011467f93d