cloudflare
npx skills add https://github.com/jakenuts/agent-skills --skill cloudflare
Agent 安装分布
Skill 文档
Cloudflare Management Skill
Created by After Dark Systems, LLC
Overview
This skill provides comprehensive Cloudflare infrastructure management capabilities through the Cloudflare API v4. It enables full control over domains, DNS, security, performance, and serverless deployments.
Authentication
API credentials are stored at ~/cloudflare_global_key. The file contains:
- Global API Key for legacy authentication
- API Token (Bearer token) for modern authentication
Recommended: Use the Bearer token for API calls:
-H "Authorization: Bearer <token>"
To verify token validity:
./scripts/cf-api.sh verify-token
Available Scripts
All scripts are located in the scripts/ directory and use the credentials from ~/cloudflare_global_key.
Core API Client
- cf-api.sh – Base API client with authentication handling
Zone Management
- zones.sh – List, get, create, and manage zones
- zone-settings.sh – Manage zone-level settings
DNS Management
- dns.sh – Full DNS record CRUD operations
- dns-import.sh – Bulk import DNS records
- dns-export.sh – Export DNS records
Security & Firewall
- firewall.sh – Firewall rules management
- waf.sh – Web Application Firewall rules
- rate-limiting.sh – Rate limiting rules
- ip-access.sh – IP access rules (block/allow)
- ssl.sh – SSL/TLS configuration
Performance & Caching
- cache.sh – Cache purge and settings
- page-rules.sh – Page rules management
- speed.sh – Speed optimizations (minify, polish, etc.)
Workers & Pages
- workers.sh – Cloudflare Workers management
- pages.sh – Cloudflare Pages projects
Analytics & Logs
- analytics.sh – Traffic and security analytics
- logs.sh – Enterprise log access
Quick Start Examples
List All Zones
./scripts/zones.sh list
Get Zone Details
./scripts/zones.sh get <zone_id>
# or by domain name
./scripts/zones.sh get-by-name example.com
List DNS Records
./scripts/dns.sh list <zone_id>
# Filter by type
./scripts/dns.sh list <zone_id> --type A
Create DNS Record
./scripts/dns.sh create <zone_id> \
--type A \
--name subdomain \
--content 192.0.2.1 \
--ttl 3600 \
--proxied true
Update DNS Record
./scripts/dns.sh update <zone_id> <record_id> \
--content 192.0.2.2 \
--ttl 1800
Delete DNS Record
./scripts/dns.sh delete <zone_id> <record_id>
Purge Cache
# Purge everything
./scripts/cache.sh purge-all <zone_id>
# Purge specific URLs
./scripts/cache.sh purge-urls <zone_id> "https://example.com/page1" "https://example.com/page2"
# Purge by cache tags
./scripts/cache.sh purge-tags <zone_id> tag1 tag2
SSL/TLS Settings
# Get current SSL mode
./scripts/ssl.sh get-mode <zone_id>
# Set SSL mode (off, flexible, full, strict)
./scripts/ssl.sh set-mode <zone_id> strict
Firewall Rules
# List firewall rules
./scripts/firewall.sh list <zone_id>
# Block an IP
./scripts/ip-access.sh block <zone_id> 192.0.2.100 "Suspicious activity"
# Allow an IP
./scripts/ip-access.sh allow <zone_id> 192.0.2.50 "Trusted server"
Workers
# List workers
./scripts/workers.sh list
# Deploy a worker
./scripts/workers.sh deploy <script_name> <script_file>
# Delete a worker
./scripts/workers.sh delete <script_name>
Common Workflows
Setting Up a New Domain
- Add the zone:
./scripts/zones.sh create example.com
- Get the zone ID:
ZONE_ID=$(./scripts/zones.sh get-by-name example.com --id-only)
- Add required DNS records:
./scripts/dns.sh create $ZONE_ID --type A --name @ --content 192.0.2.1 --proxied true
./scripts/dns.sh create $ZONE_ID --type CNAME --name www --content example.com --proxied true
./scripts/dns.sh create $ZONE_ID --type MX --name @ --content mail.example.com --priority 10
- Configure SSL:
./scripts/ssl.sh set-mode $ZONE_ID strict
Migrating DNS from Another Provider
- Export current records from the source provider
- Import to Cloudflare:
./scripts/dns-import.sh <zone_id> records.txt
Emergency: Block Attack Traffic
# Block specific IP
./scripts/ip-access.sh block <zone_id> <attacker_ip> "Attack mitigation"
# Enable Under Attack Mode
./scripts/zone-settings.sh set <zone_id> security_level under_attack
# Purge cache if compromised content was cached
./scripts/cache.sh purge-all <zone_id>
API Reference
See reference.md for complete Cloudflare API v4 documentation including:
- All available endpoints
- Request/response formats
- Error codes and handling
- Rate limiting information
Templates
The templates/ directory contains JSON templates for common operations:
dns-records.json– Common DNS record configurationsfirewall-rules.json– Firewall rule templatespage-rules.json– Page rule templatesworker-config.json– Worker configuration template
Error Handling
All scripts return appropriate exit codes:
- 0: Success
- 1: API error (check stderr for details)
- 2: Invalid arguments
- 3: Authentication error
- 4: Resource not found
Error responses include the Cloudflare error code and message for debugging.
Best Practices
- Always use proxied records when possible for DDoS protection
- Use strict SSL mode for full end-to-end encryption
- Set appropriate TTLs – shorter for dynamic content, longer for static
- Test firewall rules in log mode before enforcing
- Use API tokens with minimal required permissions
- Cache aggressively but purge when content changes
- Monitor analytics for unusual traffic patterns
Support
For issues with this skill, contact After Dark Systems, LLC.
For Cloudflare API documentation: https://developers.cloudflare.com/api/