cloudflare-workers-ci-cd

Warn

Audited by Snyk on Apr 4, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill's required CI/CD workflows and scripts (e.g., templates/preview-deployment.yml, templates/github-actions-full.yml, references/deployment-strategies.md, and scripts/verify-deployment.sh) perform curl requests against public preview/worker URLs and parse/act on the responses (health checks, expected body/status) to decide verification, rollbacks, and downstream actions, which means untrusted user-generated HTTP content can materially influence tool decisions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.70). The skill's CI workflows invoke external GitHub Actions at runtime—most notably cloudflare/wrangler-action@v4 (https://github.com/cloudflare/wrangler-action)—which are fetched and executed by the runner and are required for deployment, so they constitute an external runtime dependency that executes remote code.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 4, 2026, 07:40 AM
Issues
2