Loading...
Loading...
Manage Cloudflare infrastructure including DNS records, zones, SSL/TLS, caching, firewall rules, Workers, Pages, and analytics. Use when working with Cloudflare APIs, creating or modifying DNS records, managing domain security, purging cache, deploying Workers/Pages, or analyzing traffic. Created by After Dark Systems, LLC.
npx skill4agent add jakenuts/agent-skills cloudflare~/cloudflare_global_key-H "Authorization: Bearer <token>"./scripts/cf-api.sh verify-tokenscripts/~/cloudflare_global_key./scripts/zones.sh list./scripts/zones.sh get <zone_id>
# or by domain name
./scripts/zones.sh get-by-name example.com./scripts/dns.sh list <zone_id>
# Filter by type
./scripts/dns.sh list <zone_id> --type A./scripts/dns.sh create <zone_id> \
--type A \
--name subdomain \
--content 192.0.2.1 \
--ttl 3600 \
--proxied true./scripts/dns.sh update <zone_id> <record_id> \
--content 192.0.2.2 \
--ttl 1800./scripts/dns.sh delete <zone_id> <record_id># Purge everything
./scripts/cache.sh purge-all <zone_id>
# Purge specific URLs
./scripts/cache.sh purge-urls <zone_id> "https://example.com/page1" "https://example.com/page2"
# Purge by cache tags
./scripts/cache.sh purge-tags <zone_id> tag1 tag2# Get current SSL mode
./scripts/ssl.sh get-mode <zone_id>
# Set SSL mode (off, flexible, full, strict)
./scripts/ssl.sh set-mode <zone_id> strict# List firewall rules
./scripts/firewall.sh list <zone_id>
# Block an IP
./scripts/ip-access.sh block <zone_id> 192.0.2.100 "Suspicious activity"
# Allow an IP
./scripts/ip-access.sh allow <zone_id> 192.0.2.50 "Trusted server"# List workers
./scripts/workers.sh list
# Deploy a worker
./scripts/workers.sh deploy <script_name> <script_file>
# Delete a worker
./scripts/workers.sh delete <script_name>./scripts/zones.sh create example.comZONE_ID=$(./scripts/zones.sh get-by-name example.com --id-only)./scripts/dns.sh create $ZONE_ID --type A --name @ --content 192.0.2.1 --proxied true
./scripts/dns.sh create $ZONE_ID --type CNAME --name www --content example.com --proxied true
./scripts/dns.sh create $ZONE_ID --type MX --name @ --content mail.example.com --priority 10./scripts/ssl.sh set-mode $ZONE_ID strict./scripts/dns-import.sh <zone_id> records.txt# Block specific IP
./scripts/ip-access.sh block <zone_id> <attacker_ip> "Attack mitigation"
# Enable Under Attack Mode
./scripts/zone-settings.sh set <zone_id> security_level under_attack
# Purge cache if compromised content was cached
./scripts/cache.sh purge-all <zone_id>reference.mdtemplates/dns-records.jsonfirewall-rules.jsonpage-rules.jsonworker-config.json