Skip to content

Commit 7e3d51c

Browse files
fix warning
1 parent 0114e11 commit 7e3d51c

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

src/content/docs/cloudflare-challenges/challenge-types/javascript-detections.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Use JavaScript Detections API for more granular control over when and where Java
3737

3838
You can explicitly add a script reference to `jsd/api.js` and your own code calling `window.cloudflare.jsd.executeOnce` on specific HTML pages of your website.
3939

40-
:::warning
40+
:::caution
4141
It is not recommended to combine both approaches (zone-wide toggle and the manual injection). If you want to selectively deploy JavaScript Detections only on certain pages, disable JavaScript Detections via the Cloudflare dashboard and use the JSD API exclusively.
4242
:::
4343

src/content/partials/cloudflare-challenges/javascript-detections-process.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Once the JavaScript Detection is injected on the HTML page, the visitor's browse
2121
The `cf-clearance` cookie cannot exceed the maximum size of 4096 bytes.
2222
:::
2323

24-
:::warning
24+
:::caution
2525
Enforcement against bots do **not** occur even if the cookie is flagged false.
2626

2727
You must enable JavaScript Detections and then create a custom WAF rule using the `cf.bot_management.js.detection.passed` field to block or challenge a failed request.

0 commit comments

Comments
 (0)