mcp-cloudflare — Cloudflare Workers integration mcp-cloudflare, ship-faster, community, Cloudflare Workers integration, ide skills, mcp-cloudflare install, Cloudflare services integration, Cloudflare R2 storage, Claude Code, Cursor, Windsurf

v1.0.0
GitHub

About this Skill

Perfect for Cloudflare-focused Agents needing streamlined workflow integration and troubleshooting via MCP mcp-cloudflare is a skill that allows interaction with Cloudflare services via MCP, facilitating file-based pipeline management and workflow integration.

Features

Interacts with Cloudflare Workers for serverless computing
Utilizes Cloudflare KV for secure key-value storage
Supports Cloudflare R2 for object storage and retrieval
Enables Observability for monitoring and analytics
Facilitates Builds and Audit for streamlined development and security
Integrates with Container Sandbox for secure testing and deployment

# Core Topics

Heyvhuang Heyvhuang
[0]
[0]
Updated: 3/8/2026

Agent Capability Analysis

The mcp-cloudflare skill by Heyvhuang is an open-source community AI agent skill for Claude Code and other IDE workflows, helping agents execute tasks with better context, repeatability, and domain-specific guidance. Optimized for Cloudflare Workers integration, mcp-cloudflare install, Cloudflare services integration.

Ideal Agent Persona

Perfect for Cloudflare-focused Agents needing streamlined workflow integration and troubleshooting via MCP

Core Value

Empowers agents to interact with Cloudflare services such as Workers, KV, R2, D1, Hyperdrive, Observability, Builds, Audit, and Container Sandbox, leveraging file-based pipelines and disk-persisted evidence for robust troubleshooting and automation, utilizing protocols and file structures like `runs/<workflow>/active/<run_id>/`

Capabilities Granted for mcp-cloudflare

Automating Cloudflare Worker deployments
Debugging issues with Cloudflare KV and R2 storage
Optimizing Cloudflare Observability and Builds for enhanced performance

! Prerequisites & Limits

  • Requires MCP compatibility
  • Filesystem access needed for persisting evidence and artifacts
  • Specific directory structure required for workflow integration
Labs Demo

Browser Sandbox Environment

⚡️ Ready to unleash?

Experience this Agent in a zero-setup browser environment powered by WebContainers. No installation required.

Boot Container Sandbox

mcp-cloudflare

Install mcp-cloudflare, an AI agent skill for AI agent workflows and automation. Works with Claude Code, Cursor, and Windsurf with one-command setup.

SKILL.md
Readonly

Cloudflare MCP Skill

Interact with Cloudflare services via MCP: Workers, KV, R2, D1, Hyperdrive, Observability, Builds, Audit, Container Sandbox.

File-based Pipeline (Pass Paths Only)

When integrating troubleshooting/changes into multi-step workflows, persist all evidence and artifacts to disk, passing only paths between agents/sub-agents.

Recommended directory structure (within project): runs/<workflow>/active/<run_id>/

  • Input: 01-input/goal.md (symptoms/objectives), 01-input/context.json (account/worker/resource/time_range, etc.)
  • Evidence: 02-analysis/observability.md, 02-analysis/audit.md, 02-analysis/screenshots/
  • Plan: 03-plans/change-plan.md (write operation plan; must write here and await confirmation first)
  • Output: 05-final/report.md (conclusion + evidence chain + tool call summary + next steps)
  • Logs: logs/events.jsonl (summary of each tool call)

Permission Tiers (Core Principles)

TierPurposeTool ScopeRisk Control
DiagnoseRead-only/query/troubleshootObservability, Builds, Browser, AuditDefault entry point, no write operations
ChangeCreate/modify/delete resourcesWorkers Bindings (KV/R2/D1)Requires user confirmation, post-execution verification
Super AdminHighest privilegesAll + Container SandboxOnly in isolated environments/test accounts

Tool Reference

Diagnose Tier (Read-only)

Observability

ToolPurpose
query_worker_observabilityQuery logs/metrics (events, CPU, error rate)
observability_keysDiscover available fields
observability_valuesExplore field values

Builds

ToolPurpose
workers_builds_list_buildsList build history
workers_builds_get_buildGet build details
workers_builds_get_build_logsGet build logs

Browser Rendering (Page Capture)

ToolPurpose
get_url_html_contentFetch page HTML
get_url_markdownConvert to Markdown
get_url_screenshotTake page screenshot

Audit Logs

ToolPurpose
auditlogs_by_account_idPull change history by time range

Change Tier (Write Operations)

Account

ToolPurpose
accounts_listList accounts
set_active_accountSet active account

Builds (Settings)

ToolPurpose
workers_builds_set_active_worker⚠️ Set active worker (requires confirmation)

KV

ToolPurpose
kv_namespaces_listList namespaces
kv_namespace_getGet details
kv_namespace_createCreate (⚠️ requires confirmation)
kv_namespace_updateUpdate (⚠️ requires confirmation)
kv_namespace_deleteDelete (⚠️ requires confirmation)

R2

ToolPurpose
r2_buckets_listList buckets
r2_bucket_getGet details
r2_bucket_createCreate (⚠️ requires confirmation)
r2_bucket_deleteDelete (⚠️ requires confirmation)

D1

ToolPurpose
d1_databases_listList databases
d1_database_getGet details
d1_database_queryExecute SQL
d1_database_createCreate (⚠️ requires confirmation)
d1_database_deleteDelete (⚠️ requires confirmation)

Hyperdrive

ToolPurpose
hyperdrive_configs_listList configs
hyperdrive_config_getGet details
hyperdrive_config_createCreate (⚠️ requires confirmation)
hyperdrive_config_editEdit (⚠️ requires confirmation)
hyperdrive_config_deleteDelete (⚠️ requires confirmation)

Workers

ToolPurpose
workers_listList workers
workers_get_workerGet worker details
workers_get_worker_codeGet source code

Super Admin Tier (Container Sandbox)

ToolPurpose
container_initializeInitialize container (~10 min lifecycle)
container_execExecute command
container_file_writeWrite file
container_file_readRead file
container_files_listList files
container_file_deleteDelete file

Container Notes: No persistent state, short lifespan, only for temporary tasks (running tests/reproducing issues/parsing data).

Security Rules (Must Follow)

Read Operations

  1. Define scope first: account / worker / resource ID
  2. No account? Run accounts_list first
  3. Conclusions must have evidence chain: logs/screenshots/audit records

Write Operations (Three-step Flow)

1. Plan: Read current state first (list/get)
2. Confirm: Output precise change (name/ID/impact scope), await user confirmation
3. Execute: create/delete/update
4. Verify: audit logs + observability confirm no new errors

Prohibited Actions

  • ❌ Execute create/delete/update without confirmation
  • ❌ Delete production resources (unless user explicitly says "delete production xxx")
  • ❌ Use Super Admin privileges in non-isolated environments
  • ❌ Use container sandbox as persistent environment

Operation Workflows

Troubleshooting Flow (Typical)

1. Clarify symptoms → worker name/time range/error type
2. query_worker_observability to pull logs/metrics
3. If build-related → workers_builds_get_build_logs
4. If page-related → get_url_screenshot to reproduce
5. Trace changes → auditlogs_by_account_id
6. Summarize: root cause + evidence + fix recommendations

Resource Management Flow

1. accounts_list → set_active_account
2. List resources (kv_namespaces_list / r2_buckets_list / d1_databases_list)
3. Plan changes → present to user
4. Execute after confirmation
5. Verify: audit logs + observability shows no errors

Output Format

  • Language: English
  • Structure: Conclusion → Key data/evidence → Tool call summary → Next steps
  • Write operations: Must clearly list operations to be executed and impact scope

Example output:

✅ Investigation complete: worker `api-gateway` experienced 5xx spike between 18:00-18:30

Root cause: New code deployed threw TypeError when processing /v2/users
Evidence:
- Logs: 18:02 first occurrence of "Cannot read property 'id' of undefined"
- Audit: 18:00 user dev@example.com deployed new version
- Metrics: error_rate jumped from 0.1% to 12%

Recommendation: Roll back to previous version, or fix /v2/users handler

Error Handling

SituationAction
Account not setRun accounts_listset_active_account first
Resource doesn't existVerify ID/name is correct, list available resources
Insufficient permissionsExplain required permissions, suggest checking API token scope
Observability query too longSplit into smaller time ranges, ask more specific questions

Scenario Examples

See scenarios.md for 20 real-world development scenarios.

FAQ & Installation Steps

These questions and steps mirror the structured data on this page for better search understanding.

? Frequently Asked Questions

What is mcp-cloudflare?

Perfect for Cloudflare-focused Agents needing streamlined workflow integration and troubleshooting via MCP mcp-cloudflare is a skill that allows interaction with Cloudflare services via MCP, facilitating file-based pipeline management and workflow integration.

How do I install mcp-cloudflare?

Run the command: npx killer-skills add Heyvhuang/ship-faster. It works with Cursor, Windsurf, VS Code, Claude Code, and 19+ other IDEs.

What are the use cases for mcp-cloudflare?

Key use cases include: Automating Cloudflare Worker deployments, Debugging issues with Cloudflare KV and R2 storage, Optimizing Cloudflare Observability and Builds for enhanced performance.

Which IDEs are compatible with mcp-cloudflare?

This skill is compatible with Cursor, Windsurf, VS Code, Trae, Claude Code, OpenClaw, Aider, Codex, OpenCode, Goose, Cline, Roo Code, Kiro, Augment Code, Continue, GitHub Copilot, Sourcegraph Cody, and Amazon Q Developer. Use the Killer-Skills CLI for universal one-command installation.

Are there any limitations for mcp-cloudflare?

Requires MCP compatibility. Filesystem access needed for persisting evidence and artifacts. Specific directory structure required for workflow integration.

How To Install

  1. 1. Open your terminal

    Open the terminal or command line in your project directory.

  2. 2. Run the install command

    Run: npx killer-skills add Heyvhuang/ship-faster. The CLI will automatically detect your IDE or AI agent and configure the skill.

  3. 3. Start using the skill

    The skill is now active. Your AI agent can use mcp-cloudflare immediately in the current project.

Related Skills

Looking for an alternative to mcp-cloudflare or another community skill for your workflow? Explore these related open-source skills.

View All

widget-generator

Logo of f
f

f.k.a. Awesome ChatGPT Prompts. Share, discover, and collect prompts from the community. Free and open source — self-host for your organization with complete privacy.

149.6k
0
AI

flags

Logo of vercel
vercel

flags is a Next.js feature management skill that enables developers to efficiently add or modify framework feature flags, streamlining React application development.

138.4k
0
Browser

zustand

Logo of lobehub
lobehub

The ultimate space for work and life — to find, build, and collaborate with agent teammates that grow with you. We are taking agent harness to the next level — enabling multi-agent collaboration, effortless agent team design, and introducing agents as the unit of work interaction.

72.8k
0
AI

data-fetching

Logo of lobehub
lobehub

The ultimate space for work and life — to find, build, and collaborate with agent teammates that grow with you. We are taking agent harness to the next level — enabling multi-agent collaboration, effortless agent team design, and introducing agents as the unit of work interaction.

72.8k
0
AI