## Get Leaked Credential Checks Custom Detection `client.leakedCredentialChecks.detections.get(stringdetectionId, DetectionGetParamsparams, RequestOptionsoptions?): DetectionGetResponse` **get** `/zones/{zone_id}/leaked-credential-checks/detections/{detection_id}` Get user-defined detection pattern for Leaked Credential Checks. ### Parameters - `detectionId: string` Defines the unique ID for this custom detection. - `params: DetectionGetParams` - `zone_id: string` Defines an identifier. ### Returns - `DetectionGetResponse` Defines a custom set of username/password expressions to match Leaked Credential Checks on. - `id?: string` Defines the unique ID for this custom detection. - `password?: string` Defines ehe ruleset expression to use in matching the password in a request. - `username?: string` Defines the ruleset expression to use in matching the username in a request. ### Example ```node import Cloudflare from 'cloudflare'; const client = new Cloudflare({ apiToken: process.env['CLOUDFLARE_API_TOKEN'], // This is the default and can be omitted }); const detection = await client.leakedCredentialChecks.detections.get( '18a14bafaa8eb1df04ce683ec18c765e', { zone_id: '023e105f4ecef8ad9ca31a8372d0c353' }, ); console.log(detection.id); ``` #### Response ```json { "errors": [ { "code": 1000, "message": "message", "documentation_url": "documentation_url", "source": { "pointer": "pointer" } } ], "messages": [ { "code": 1000, "message": "message", "documentation_url": "documentation_url", "source": { "pointer": "pointer" } } ], "result": { "id": "18a14bafaa8eb1df04ce683ec18c765e", "password": "lookup_json_string(http.request.body.raw, \"secret\")", "username": "lookup_json_string(http.request.body.raw, \"user\")" }, "success": true } ```