@webframp/cloudflare-audit
v2026.04.22.2
Cloudflare security and configuration audit workflow. Inspects zone settings, DNS records, WAF rules, Workers, and cache configuration, then generates a severity-rated report with findings and recommendations.
Quick Start
swamp extension pull @webframp/cloudflare-audit
swamp model create @webframp/cloudflare/zone cf-zone \
--global-arg apiToken=CLOUDFLARE_API_TOKEN
swamp model create @webframp/cloudflare/dns cf-dns \
--global-arg apiToken=CLOUDFLARE_API_TOKEN --global-arg zoneId=ZONE_ID
swamp model create @webframp/cloudflare/waf cf-waf \
--global-arg apiToken=CLOUDFLARE_API_TOKEN --global-arg zoneId=ZONE_ID
swamp model create @webframp/cloudflare/worker cf-worker \
--global-arg apiToken=CLOUDFLARE_API_TOKEN --global-arg accountId=ACCOUNT_ID
swamp model create @webframp/cloudflare/cache cf-cache \
--global-arg apiToken=CLOUDFLARE_API_TOKEN --global-arg zoneId=ZONE_ID
swamp workflow run @webframp/cloudflare-audit --input zoneId=ZONE_IDChecks Performed
- SSL mode (off/flexible/full/strict)
- Always Use HTTPS enabled
- Development mode disabled
- Zone paused/active status
- Firewall rules present and active
- WAF managed rulesets enabled
- DNS records proxied (origin IP exposure)
- Dangling CNAMEs (subdomain takeover risk)
- CAA records present
- Worker scripts bound to routes
- Cache level and hit rate
Repository
https://github.com/webframp/swamp-extensions
Labels
Quality score
How well-documented and verifiable this extension is.
Grade A
- Has README or module doc2/2earned
- README has a code example1/1earned
- README is substantive1/1earned
- Most symbols documented1/1earned
- No slow types1/1earned
- Has description1/1earned
- At least one platform tag (or universal)1/1earned
- Two or more platform tags (or universal)1/1earned
- License declared1/1earned
- Verified public repository2/2earned
Install
$ swamp extension pull @webframp/cloudflare-auditCloudflare security and configuration audit. Inspects zone settings, DNS records, WAF rules, Workers, and cache config, then generates a severity-rated report with findings and recommendations.
Analyzes Cloudflare zone configuration for security, DNS hygiene, WAF coverage, worker health, and cache performance
Cloudflare security and configuration audit workflow. Inspects zone settings, DNS records, WAF rules, Workers, and cache configuration, then generates a severity-rated report with findings and recommendations. ## Quick Start ```bash swamp extension pull @webframp/cloudflare-audit swamp model create @webframp/cloudflare/zone cf-zone \ --global-arg apiToken=CLOUDFLARE_API_TOKEN swamp model create @webframp/cloudflare/dns cf-dns \ --global-arg apiToken=CLOUDFLARE_API_TOKEN --global-arg zoneId=ZONE_ID swamp model create @webframp/cloudflare/waf cf-waf \ --global-arg apiToken=CLOUDFLARE_API_TOKEN --global-arg zoneId=ZONE_ID swamp model create @webframp/cloudflare/worker cf-worker \ --global-arg apiToken=CLOUDFLARE_API_TOKEN --global-arg accountId=ACCOUNT_ID swamp model create @webframp/cloudflare/cache cf-cache \ --global-arg apiToken=CLOUDFLARE_API_TOKEN --global-arg zoneId=ZONE_ID swamp workflow run @webframp/cloudflare-audit --input zoneId=ZONE_ID ``` ## Checks Performed - SSL mode (off/flexible/full/strict) - Always Use HTTPS enabled - Development mode disabled - Zone paused/active status - Firewall rules present and active - WAF managed rulesets enabled - DNS records proxied (origin IP exposure) - Dangling CNAMEs (subdomain takeover risk) - CAA records present - Worker scripts bound to routes - Cache level and hit rate
Changelog
Platforms
Cloudflare security and configuration audit workflow. Inspects zone settings, DNS records, WAF rules, Workers, and cache configuration, then generates a severity-rated report with findings and recommendations. ## Quick Start ```bash swamp extension pull @webframp/cloudflare-audit swamp model create @webframp/cloudflare/zone cf-zone \ --global-arg apiToken=CLOUDFLARE_API_TOKEN swamp model create @webframp/cloudflare/dns cf-dns \ --global-arg apiToken=CLOUDFLARE_API_TOKEN --global-arg zoneId=ZONE_ID swamp model create @webframp/cloudflare/waf cf-waf \ --global-arg apiToken=CLOUDFLARE_API_TOKEN --global-arg zoneId=ZONE_ID swamp model create @webframp/cloudflare/worker cf-worker \ --global-arg apiToken=CLOUDFLARE_API_TOKEN --global-arg accountId=ACCOUNT_ID swamp model create @webframp/cloudflare/cache cf-cache \ --global-arg apiToken=CLOUDFLARE_API_TOKEN --global-arg zoneId=ZONE_ID swamp workflow run @webframp/cloudflare-audit --input zoneId=ZONE_ID ``` ## Checks Performed - SSL mode (off/flexible/full/strict) - Always Use HTTPS enabled - Development mode disabled - Zone paused/active status - Firewall rules present and active - WAF managed rulesets enabled - DNS records proxied (origin IP exposure) - Dangling CNAMEs (subdomain takeover risk) - CAA records present - Worker scripts bound to routes - Cache level and hit rate