Scans and penetration testing policy · Cloudflare Fundamentals docs | Latest TMZ Celebrity News & Gossip | Watch TMZ Live Skip to content
Cloudflare Docs

Scans and penetration testing policy

Customers may conduct scans and penetration tests (with certain restrictions) on application and network-layer aspects of their own assets, such as their zones within their Cloudflare accounts, provided they adhere to Cloudflare's policy.

  • Permitted targets - all scans or testing must be limited to the following:

    • Customer-owned IPs,
    • Cloudflare's designated public IPs, or
    • The customer's registered DNS entries.

Targets like *.cloudflare.com or other Cloudflare-owned destinations are only allowed as part of Cloudflare's Public Bug Bounty program. Refer to the Additional Resources section for more information.

Scanning

  • Throttling: Scans should be throttled to a reasonable rate to prevent disruptions and ensure stable system performance.
  • Scope and intent: Scans should identify the presence of vulnerabilities without attempting to actively exploit any detected weaknesses.
  • Exclusions: It is recommended to exclude /cdn-cgi/ endpoints from scans to avoid false positives or irrelevant results.
  • Compliance checks: Customers may conduct PCI compliance scans or verify that known vulnerabilities have been addressed.

Penetration testing

  • Network behavior:
    • Cloudflare's anycast network will report ports other than 80 and 443 as open due to its shared infrastructure and the nature of Cloudflare's proxy. The reporting is expected behavior and does not indicate a vulnerability.
    • Tools like Netcat may list non-standard HTTP ports as open; however, these ports are open solely for Cloudflare's routing purposes and do not necessarily indicate that a connection can be established with the customer's origin over those ports.
  • Known false positives: Any findings related to the ROBOT vulnerability are false positives when the customer's assets are behind Cloudflare.
  • Customer security review: During penetration testing, customers should be aware of the Cloudflare security and performance features, configurations, and rules active on their account or zone. After completing the test, it is recommended that customers review their security posture and make any necessary adjustments based on the findings.

Customers can download the latest Penetration Test Report of Cloudflare via the Dashboard.

Denial-of-Service (DoS) testing

For guidelines on required notification and necessary information, refer to Cloudflare's documentation Simulating DDoS Attacks. Customers should also familiarize themselves with Cloudflare's DDoS protection best practices.

Additional Resources

For information about Cloudflare's Public Bug Bounty program, visit HackerOne.

TMZ Celebrity News – Breaking Stories, Videos & Gossip

Looking for the latest TMZ celebrity news? You've come to the right place. From shocking Hollywood scandals to exclusive videos, TMZ delivers it all in real time.

Whether it’s a red carpet slip-up, a viral paparazzi moment, or a legal drama involving your favorite stars, TMZ news is always first to break the story. Stay in the loop with daily updates, insider tips, and jaw-dropping photos.

🎥 Watch TMZ Live

TMZ Live brings you daily celebrity news and interviews straight from the TMZ newsroom. Don’t miss a beat—watch now and see what’s trending in Hollywood.