Skip to content

Changelog

New updates and improvements at Cloudflare.

hero image

Detect Cloudflare API tokens with DLP

The Credentials and Secrets DLP profile now includes three new predefined entries for detecting Cloudflare API credentials:

Entry nameToken prefixDetects
Cloudflare User API Keycfk_User-scoped API keys
Cloudflare User API Tokencfut_User-scoped API tokens
Cloudflare Account Owned API Tokencfat_Account-scoped API tokens

These detections target the new Cloudflare API credential format, which uses a structured prefix and a CRC32 checksum suffix. The identifiable prefix makes it possible to detect leaked credentials with high confidence and low false positive rates — no surrounding context such as Authorization: Bearer headers is required.

Credentials generated before this format change will not be matched by these entries.

How to enable Cloudflare API token detections

  1. In the Cloudflare dashboard, go to Zero Trust > DLP > DLP Profiles.
  2. Select the Credentials and Secrets profile.
  3. Turn on one or more of the new Cloudflare API token entries.
  4. Use the profile in a Gateway HTTP policy to log or block traffic containing these credentials.

Example policy:

SelectorOperatorValueAction
DLP ProfileinCredentials and SecretsBlock

You can also enable individual entries to scope detection to specific credential types — for example, enabling Account Owned API Token detection without enabling User API Key detection.

For more information, refer to predefined DLP profiles.