From argos
Cloudflare ekosistem disipline (CDN'in ötesinde) — account/RBAC + API token scoped, DNS (proxied vs gray, CNAME flattening, DNSSEC, CAA), SSL/TLS (Full strict zorunlu, HSTS, Authenticated Origin Pulls mTLS), WAF (Managed Ruleset + Rate Limit + Bot Management), Workers (CPU < 50ms, wrangler.toml, gradual deployment, Service Bindings, Logpush), R2 (S3-compat egress FREE), Pages (JAMstack + Functions + preview Access), Zero Trust (Access + Tunnel + Service Token + Device Posture), D1/Queues/KV/Durable Objects, Turnstile (server siteverify), Logpush + Analytics, cost model (Free/Pro/Business/Enterprise + Workers Paid + R2 storage).
npx claudepluginhub resultakak/argos --plugin argosThis skill uses the workspace's default tool permissions.
`agents/shared/severity-rubric.md` ve `agents/shared/escalation-matrix.md`
Mandates invoking relevant skills via tools before any response in coding sessions. Covers access, priorities, and adaptations for Claude Code, Copilot CLI, Gemini CLI.
Share bugs, ideas, or general feedback.
agents/shared/severity-rubric.md ve agents/shared/escalation-matrix.md
default-load sayılır (agents/coordination.md §11). Bu skill'in çıktısı
Critical / High / Medium / Low + kanıt formatında olmak zorunda — spekülatif
Critical yasak. Sahiplik dışı bulgu ilgili agent'a delege; karar yetkisi eşiği
aşılırsa kullanıcı onayı zorunlu.
# API token gerekli
curl -s -H "Authorization: Bearer $CF_TOKEN" https://api.cloudflare.com/client/v4/zones | jq '.result[] | {name, status, plan: .plan.name}'
curl -s -H "Authorization: Bearer $CF_TOKEN" https://api.cloudflare.com/client/v4/zones/$ZONE_ID/settings/ssl
curl -s -H "Authorization: Bearer $CF_TOKEN" https://api.cloudflare.com/client/v4/zones/$ZONE_ID/settings/always_use_https
wrangler whoami
wrangler r2 bucket list
Full (strict) mi? Flexible/Full(non-strict) YASAK.rules/cdn.md + cdn-engineering skill'e delege. Cloudflare-spesifik:
wrangler.toml Git-tracked + compatibility_date pin?api.acme.com/*); wildcard zone YASAK.wrangler secret put (plain [vars] non-sensitive)?wrangler tail ile inspect.fetch() mu?console.log PII: PII leak yok mu?# wrangler.toml minimum
name = "api-edge"
main = "src/index.ts"
compatibility_date = "2026-05-01"
workers_dev = false
[env.prod]
routes = [{ pattern = "api.acme.com/*", custom_domain = true }]
[[env.prod.observability]]
enabled = true
<account>.r2.cloudflarestorage.com.rclone cron._headers Cache-Control immutable + security header (CSP, X-Frame-Options)._redirects explicit.functions/ Workers-backed.cloudflared + origin IP private (firewall inbound kapalı)?Critical / High / Medium / Low + kanıt + sahip + tarih + projected impact.
wrangler.toml secret commit.* zone route.console.log PII Workers (Logpush PII leak).cdn-engineering skill — CDN cache + TTL + purge detay.security-reviewer — SSL mode, WAF, Access policy, secret.platform-engineer — Tunnel + DNS + zone topology.frontend-implementer — Pages build + _headers + Functions.backend-reviewer — Workers + R2 SDK pattern.observability-engineer — Logpush + Workers Analytics.finops-review skill — plan tier + R2 + Workers cost.iac-engineer — Cloudflare Terraform provider.# Cloudflare Review: acme.com
## Current state
- Plan: Pro / 1 zone
- SSL: Flexible (KRİTİK — edge↔origin plaintext)
- Workers: 3 service (api-edge, geo-redirect, image-resize)
- R2: 2 bucket (avatars, backups)
- Pages: 1 site (admin), preview public
## Findings
- **Critical**: SSL Flexible — MITM riski
- **Critical**: Pages preview public (admin code expose)
- **Critical**: Tunnel yok, origin IP public
- **High**: API Token Global Key (scope minimal değil)
- **High**: HSTS kapalı
- **High**: WAF Managed Ruleset off
- **Medium**: Workers gradual deploy yok (100% direkt)
- **Medium**: Rate Limit yok login endpoint
- **Medium**: Logpush yok (incident forensic 30g UI only)
- **Low**: R2 avatar bucket public (CDN behind değil)
## Action items
| P0 | SSL Full (strict) + origin cert | @platform | 2026-05-18 |
| P0 | Pages preview Access policy | @security | 2026-05-18 |
| P0 | Tunnel cloudflared kurulum + origin firewall inbound deny | @platform | 2026-05-20 |
| P1 | API Token scope: Zone:Read/Workers:Edit; Global Key revoke | @security | 2026-05-23 |
| P1 | HSTS preload (max-age 6mo → 1y after test) | @security | 2026-05-23 |
| P1 | WAF Managed Ruleset OWASP + CF Managed enable | @security | 2026-05-23 |
| P2 | Workers gradual deploy 1→10→100% | @platform | 2026-06-06 |
| P2 | Rate Limit /login 10 req/min/IP | @security | 2026-06-06 |
| P2 | Logpush → R2 retention 90g | @observability | 2026-06-13 |
| P3 | R2 avatar bucket private + CDN behind | @platform | 2026-06-20 |