## Update Leaked Credential Checks Custom Detection `leaked_credential_checks.detections.update(strdetection_id, DetectionUpdateParams**kwargs) -> DetectionUpdateResponse` **put** `/zones/{zone_id}/leaked-credential-checks/detections/{detection_id}` Update user-defined detection pattern for Leaked Credential Checks. ### Parameters - `zone_id: str` Defines an identifier. - `detection_id: str` Defines the unique ID for this custom detection. - `password: Optional[str]` Defines ehe ruleset expression to use in matching the password in a request. - `username: Optional[str]` Defines the ruleset expression to use in matching the username in a request. ### Returns - `class DetectionUpdateResponse: …` Defines a custom set of username/password expressions to match Leaked Credential Checks on. - `id: Optional[str]` Defines the unique ID for this custom detection. - `password: Optional[str]` Defines ehe ruleset expression to use in matching the password in a request. - `username: Optional[str]` Defines the ruleset expression to use in matching the username in a request. ### Example ```python import os from cloudflare import Cloudflare client = Cloudflare( api_token=os.environ.get("CLOUDFLARE_API_TOKEN"), # This is the default and can be omitted ) detection = client.leaked_credential_checks.detections.update( detection_id="18a14bafaa8eb1df04ce683ec18c765e", zone_id="023e105f4ecef8ad9ca31a8372d0c353", ) print(detection.id) ``` #### Response ```json { "errors": [ { "code": 1000, "message": "message", "documentation_url": "documentation_url", "source": { "pointer": "pointer" } } ], "messages": [ { "code": 1000, "message": "message", "documentation_url": "documentation_url", "source": { "pointer": "pointer" } } ], "result": { "id": "18a14bafaa8eb1df04ce683ec18c765e", "password": "lookup_json_string(http.request.body.raw, \"secret\")", "username": "lookup_json_string(http.request.body.raw, \"user\")" }, "success": true } ```