Use this template
Open Cloudflare Security Audit in Devin and create the automation with the default configuration. You can customize it before saving.
What this automation does
Cloudflare sits at the perimeter of your infrastructure, which means Cloudflare changes can silently shift your security posture. The Cloudflare Audit Logs MCP gives Devin read access to the full change history — who changed what, when, and from where — so you get a human-readable weekly summary instead of a 10,000-line JSON dump.How it works
Trigger: Schedule event —recurring
- Event:
schedule:recurring- Conditions:
rrulematchesFREQ=WEEKLY;BYDAY=MO;BYHOUR=9;BYMINUTE=0
- Conditions:
Prerequisites
- MCP servers:
- Cloudflare Audit Logs MCP — connects Devin to Cloudflare Audit Logs
Example prompt
The template ships with this prompt. You can edit it after clicking Use template, or leave it as-is.Setting it up
- Open Automations → Templates in Devin.
- Click Cloudflare Security Audit. The create page opens with this template pre-filled.
- Connect any required integrations and install MCP servers if you haven’t already.
- Replace any placeholder values in the trigger conditions (for example, swap
your-org/your-repofor your actual repo). - Review the prompt and adjust it for your team’s language, conventions, and guardrails.
- Click Create automation.
When to use this template
- Security teams maintaining compliance posture across Cloudflare accounts
- Platform teams preventing accidental misconfiguration
- Detecting insider threat or credential compromise
- SOC 2 / ISO 27001 evidence generation for Cloudflare changes
Customization ideas
- Change the cadence (daily, weekly, monthly)
- Scope to specific accounts, zones, or rule sets
- Cross-reference with identity provider audit logs
- Escalate high-severity findings to PagerDuty or Opsgenie
