Common API calls
The following examples address common scenarios of using the Cloudflare API to manage and configure leaked credentials detection.
If you are using Terraform, refer to Terraform configuration examples.
The following API examples cover basic operations such as enabling and disabling the leaked credentials detection.
To turn on leaked credentials detection, use a POST request similar to the following:
Required API token permissions
At least one of the following token permissions
is required:
Zone WAF WriteAccount WAF Write
curl "https://api.cloudflare.com/client/v4/zones/$ZONE_ID/leaked-credential-checks" \ --request POST \ --header "Authorization: Bearer $CLOUDFLARE_API_TOKEN" \ --json '{ "enabled": true }'To turn off leaked credentials detection, use a POST request similar to the following:
Required API token permissions
At least one of the following token permissions
is required:
Zone WAF WriteAccount WAF Write
curl "https://api.cloudflare.com/client/v4/zones/$ZONE_ID/leaked-credential-checks" \ --request POST \ --header "Authorization: Bearer $CLOUDFLARE_API_TOKEN" \ --json '{ "enabled": false }'To obtain the current status of the leaked credentials detection, use a GET request similar to the following:
Required API token permissions
At least one of the following token permissions
is required:
Zone WAF WriteZone WAF ReadAccount WAF WriteAccount WAF Read
curl "https://api.cloudflare.com/client/v4/zones/$ZONE_ID/leaked-credential-checks" \ --request GET \ --header "Authorization: Bearer $CLOUDFLARE_API_TOKEN"{ "result": { "enabled": true }, "success": true, "errors": [], "messages": []}The following API examples cover operations on custom detection locations for leaked credentials detection.
To add a custom detection location, use a POST request similar to the following:
Required API token permissions
At least one of the following token permissions
is required:
Zone WAF WriteAccount WAF Write
curl "https://api.cloudflare.com/client/v4/zones/$ZONE_ID/leaked-credential-checks/detections" \ --request POST \ --header "Authorization: Bearer $CLOUDFLARE_API_TOKEN" \ --json '{ "username": "lookup_json_string(http.request.body.raw, \"user\")", "password": "lookup_json_string(http.request.body.raw, \"secret\")" }'To get a list of existing custom detection locations, use a GET request similar to the following:
Required API token permissions
At least one of the following token permissions
is required:
Zone WAF WriteZone WAF ReadAccount WAF WriteAccount WAF Read
curl "https://api.cloudflare.com/client/v4/zones/$ZONE_ID/leaked-credential-checks/detections" \ --request GET \ --header "Authorization: Bearer $CLOUDFLARE_API_TOKEN"{ "result": [ { "id": "<DETECTION_ID>", "username": "lookup_json_string(http.request.body.raw, \"user\")", "password": "lookup_json_string(http.request.body.raw, \"secret\")" } // (...) ], "success": true, "errors": [], "messages": []}To delete a custom detection location, use a DELETE request similar to the following:
Required API token permissions
At least one of the following token permissions
is required:
Zone WAF WriteAccount WAF Write
curl "https://api.cloudflare.com/client/v4/zones/$ZONE_ID/leaked-credential-checks/detections/$DETECTION_ID" \ --request DELETE \ --header "Authorization: Bearer $CLOUDFLARE_API_TOKEN"Was this helpful?
- Resources
- API
- New to Cloudflare?
- Products
- Sponsorships
- Open Source
- Support
- Help Center
- System Status
- Compliance
- GDPR
- Company
- cloudflare.com
- Our team
- Careers
- 2025 Cloudflare, Inc.
- Privacy Policy
- Terms of Use
- Report Security Issues
- Trademark