cloudflare-tunnel-publish

Fail

Audited by Snyk on May 9, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt mostly uses secure env-input for the Cloudflare API token, but it explicitly allows the agent to "print" the derived run_token into chat (or otherwise deliver it verbatim) when the user must run cloudflared on their laptop, which requires the LLM to output a secret value directly and therefore poses an exfiltration risk.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.70). The skill explicitly fetches and interprets content from public, user-controlled hostnames (see Phase 8: "curl https://" and "Verify content, not just status code") and from public services (scripts/check_status.py uses doh_lookup against dns.google and http_check against https://), so untrusted third-party web content and DNS/HTTP responses are read and used to decide next actions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Issues (3)

W007
HIGH

Insecure credential handling detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
HIGH
Analyzed
May 9, 2026, 04:33 PM
Issues
3