You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/rules/transform/managed-transforms/reference.mdx
+15-1Lines changed: 15 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -111,7 +111,7 @@ For example, consider an incoming request proxied by two CDNs (`CDN_1` and `CDN_
111
111
With **Remove visitor IP headers** enabled, the `x-forwarded-for` header sent to the origin server will be:<br/>
112
112
`x-forwarded-for: <THIRD_PARTY_CDN_2_IP>`
113
113
114
-
### Add Leaked Credentials Checks Header
114
+
### Add leaked credentials checks header
115
115
116
116
Adds an `Exposed-Credential-Check` request header whenever the WAF detects leaked credentials in the incoming request.
117
117
@@ -130,6 +130,20 @@ You will only receive this managed header at your origin server if:
130
130
- The **Add Leaked Credentials Checks Header** managed transform is turned on.
131
131
- Your Cloudflare plan supports the type of credentials detection. For example, Free plans can only know if a password was previously leaked. In this situation, Cloudflare will add an `Exposed-Credential-Check: 4` header to the request.
132
132
133
+
### Add malicious uploads detection header
134
+
135
+
Adds a `Malicious-Uploads-Detection` request header indicating the outcome of scanning uploaded content for malicious signatures.
|`Malicious-Uploads-Detection: 1`| The request contains at least one malicious content object ([`cf.waf.content_scan.has_malicious_obj`](/ruleset-engine/rules-language/fields/dynamic-fields/#cfwafcontent_scanhas_malicious_obj) is `true`). |
142
+
|`Malicious-Uploads-Detection: 2`| The file scanner was unable to scan all the content objects detected in the request ([`cf.waf.content_scan.has_failed`](/ruleset-engine/rules-language/fields/dynamic-fields/#cfwafcontent_scanhas_failed) is `true`). |
143
+
|`Malicious-Uploads-Detection: 3`| The request contains at least one content object ([`cf.waf.content_scan.has_obj`](/ruleset-engine/rules-language/fields/dynamic-fields/#cfwafcontent_scanhas_obj) is `true`). |
144
+
145
+
For more information, refer to [Malicious uploads detection](/waf/detections/malicious-uploads/).
0 commit comments