## List Leaked Credential Checks Custom Detections `leaked_credential_checks.detections.list(DetectionListParams**kwargs) -> SyncSinglePage[DetectionListResponse]` **get** `/zones/{zone_id}/leaked-credential-checks/detections` List user-defined detection patterns for Leaked Credential Checks. ### Parameters - `zone_id: str` Defines an identifier. ### Returns - `class DetectionListResponse: …` Defines a custom set of username/password expressions to match Leaked Credential Checks on. - `id: Optional[str]` Defines the unique ID for this custom detection. - `password: Optional[str]` Defines ehe ruleset expression to use in matching the password in a request. - `username: Optional[str]` Defines the ruleset expression to use in matching the username in a request. ### Example ```python import os from cloudflare import Cloudflare client = Cloudflare( api_token=os.environ.get("CLOUDFLARE_API_TOKEN"), # This is the default and can be omitted ) page = client.leaked_credential_checks.detections.list( zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) page = page.result[0] print(page.id) ``` #### Response ```json { "errors": [ { "code": 1000, "message": "message", "documentation_url": "documentation_url", "source": { "pointer": "pointer" } } ], "messages": [ { "code": 1000, "message": "message", "documentation_url": "documentation_url", "source": { "pointer": "pointer" } } ], "result": [ { "id": "18a14bafaa8eb1df04ce683ec18c765e", "password": "lookup_json_string(http.request.body.raw, \"secret\")", "username": "lookup_json_string(http.request.body.raw, \"user\")" } ], "success": true } ```