Skip to content

Commit 907408c

Browse files
Update src/content/docs/fundamentals/reference/scans-penetration.mdx
Co-authored-by: hyperlint-ai[bot] <154288675+hyperlint-ai[bot]@users.noreply.github.com>
1 parent d4ed918 commit 907408c

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

src/content/docs/fundamentals/reference/scans-penetration.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Targets like `*.cloudflare.com` or other Cloudflare-owned destinations are only
2727
### Penetration testing
2828

2929
- **Network behavior**:
30-
- Cloudflare's [Anycast network](/fundamentals/concepts/how-cloudflare-works/) will report ports other than 80 and 443 as open due to its shared infrastructure and the nature of Cloudflare's proxy. This is expected behavior and does not indicate a vulnerability.
30+
- Cloudflare's [anycast network](/fundamentals/concepts/how-cloudflare-works/) will report ports other than 80 and 443 as open due to its shared infrastructure and the nature of Cloudflare's proxy. This is expected behavior and does not indicate a vulnerability.
3131
- Tools like Netcat may list [non-standard HTTP ports](/fundamentals/reference/network-ports/) as open; however, these ports are open solely for Cloudflare's routing purposes and do not necessarily indicate that a connection can be established with the customer's origin over those ports.
3232

3333
- **Known false positives**: Any findings related to the [ROBOT vulnerability](/ssl/reference/compliance-and-vulnerabilities/#return-of-bleichenbachers-oracle-threat-robot) are false positives when the customer's assets are behind Cloudflare.

0 commit comments

Comments
 (0)