cloudflare-tomarkdown
Pass
Audited by Gen Agent Trust Hub on Apr 5, 2026
Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [PROMPT_INJECTION]: The skill is designed to ingest and convert untrusted content from external URLs and local files, which presents a surface for indirect prompt injection attacks.
- Ingestion points: The
scripts/render.jsscript fetches arbitrary content via the--urlargument and reads local documents via the--fileargument. - Boundary markers: The script includes a dedicated
printSafeOutputfunction that wraps the converted Markdown in explicit 'START OF UNTRUSTED CONTENT' and 'END OF UNTRUSTED CONTENT' markers, accompanied by a warning for the agent to treat the content as data. - Capability inventory: The script uses the
fetchAPI for network operations andfs.readFileSyncfor local file access. - Sanitization: The tool relies on boundary markers and agent instruction rather than semantic content sanitization.
- [DATA_EXFILTRATION]: The skill transmits data from local files or web sources to Cloudflare's infrastructure for processing.
- Evidence:
scripts/render.jssends content via POST requests tohttps://api.cloudflare.com/. While Cloudflare is a well-known service and this behavior is essential to the skill's primary function, it involves sending potentially sensitive user data to a third-party API.
Audit Metadata