Manage and configure Cloudflare services using the full OpenAPI specification. Search for endpoints and execute custom logic across products like Workers, R2, and security settings. Automate infrastructure tasks directly through API requests and integrated scripts.
| Field | Value |
|---|---|
| Grade | D |
| Risk Score | 65 |
| Version | smithery |
| Vendor | Smithery |
| Source | cloudflare |
| Scan Date | 2026-04-19 |
| Scanner | tooltrust-scanner/v0.3.8 |
| Severity | Count |
|---|---|
| Critical | 1 |
| High | 3 |
| Medium | 2 |
| Low | 2 |
| Info | 2 |
Severity: High
Description: tool declares network permission
Recommendation: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Severity: Medium
Description: tool declares db permission
Recommendation: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Severity: Low
Description: tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
Recommendation: Declare explicit rate-limit, timeout, and retry configuration for all network and execution tools. Implement exponential back-off and surface resource state to the calling agent.
Severity: Info
Description: Tool did not expose metadata.dependencies or repo_url, so supply-chain coverage is limited.
Recommendation: Review and remediate the identified issue.
Severity: High
Description: tool declares network permission
Recommendation: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Severity: High
Description: tool declares exec permission
Recommendation: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Severity: Medium
Description: tool declares db permission
Recommendation: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
Severity: Critical
Description: tool name or description implies arbitrary script/code execution (evaluate_script, execute javascript, etc.)
Recommendation: This tool can execute arbitrary code or shell commands on the host system. Remove it unless strictly required. If kept: (1) restrict access to trusted users/agents only, (2) require human approval before each invocation (Claude Desktop: set approval_required: true; other clients: enable equivalent confirmation), (3) use the most restrictive sandbox or read-only mode available, and (4) never expose this tool to untrusted input sources.
Severity: Low
Description: tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
Recommendation: Declare explicit rate-limit, timeout, and retry configuration for all network and execution tools. Implement exponential back-off and surface resource state to the calling agent.
Severity: Info
Description: Tool did not expose metadata.dependencies or repo_url, so supply-chain coverage is limited.
Recommendation: Review and remediate the identified issue.
Scored using ToolTrust methodology · Raw JSON report