<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Cloudflare changelogs | API Shield</title><description>Cloudflare changelogs for API Shield</description><link>https://developers.cloudflare.com/changelog/</link><item><title>API Shield - Web Assets fields now available in GraphQL Analytics API</title><link>https://developers.cloudflare.com/changelog/post/2026-03-23-web-assets-graphql-fields/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-03-23-web-assets-graphql-fields/</guid><description>&lt;p&gt;Two new fields are now available in the &lt;code&gt;httpRequestsAdaptive&lt;/code&gt; and &lt;code&gt;httpRequestsAdaptiveGroups&lt;/code&gt; &lt;a href=&quot;https://developers.cloudflare.com/analytics/graphql-api/&quot;&gt;GraphQL Analytics API&lt;/a&gt; datasets:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;webAssetsOperationId&lt;/code&gt; — the ID of the &lt;a href=&quot;https://developers.cloudflare.com/api-shield/management-and-monitoring/&quot;&gt;saved endpoint&lt;/a&gt; that matched the incoming request.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;webAssetsLabelsManaged&lt;/code&gt; — the &lt;a href=&quot;https://developers.cloudflare.com/api-shield/management-and-monitoring/endpoint-labels/#managed-labels&quot;&gt;managed labels&lt;/a&gt; mapped to the matched operation at the time of the request (for example, &lt;code&gt;cf-llm&lt;/code&gt;, &lt;code&gt;cf-log-in&lt;/code&gt;). At most 10 labels are returned per request.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Both fields are empty when no operation matched. &lt;code&gt;webAssetsLabelsManaged&lt;/code&gt; is also empty when no managed labels are assigned to the matched operation.&lt;/p&gt;
&lt;p&gt;These fields allow you to determine, per request, which Web Assets operation was matched and which managed labels were active. This is useful for troubleshooting downstream security detection verdicts — for example, understanding why &lt;a href=&quot;https://developers.cloudflare.com/waf/detections/ai-security-for-apps/&quot;&gt;AI Security for Apps&lt;/a&gt; did or did not flag a request.&lt;/p&gt;
&lt;p&gt;Refer to &lt;a href=&quot;https://developers.cloudflare.com/api-shield/management-and-monitoring/endpoint-labels/#analytics&quot;&gt;Endpoint labeling service&lt;/a&gt; for GraphQL query examples.&lt;/p&gt;</description><pubDate>Mon, 23 Mar 2026 00:00:00 GMT</pubDate><product>API Shield</product><category>API Shield</category></item><item><title>API Shield - New Vulnerability Scanner for API Shield</title><link>https://developers.cloudflare.com/changelog/post/2026-03-09-vulnerability-scanner/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2026-03-09-vulnerability-scanner/</guid><description>&lt;p&gt;Introducing Cloudflare&apos;s Web and API Vulnerability Scanner (Open Beta)&lt;/p&gt;
&lt;p&gt;Cloudflare is launching the &lt;a href=&quot;https://blog.cloudflare.com/vulnerability-scanner&quot; target=&quot;_blank&quot;&gt;Open Beta of the &lt;strong&gt;Web and API Vulnerability Scanner&lt;/strong&gt;&lt;/a&gt; for all &lt;a href=&quot;https://developers.cloudflare.com/api-shield/&quot;&gt;API Shield&lt;/a&gt; customers. This new, stateful Dynamic Application Security Testing (DAST) platform helps teams proactively find logic flaws in their APIs.&lt;/p&gt;
&lt;p&gt;The initial release focuses on detecting Broken Object Level Authorization (BOLA) vulnerabilities by building API call graphs to simulate attacker and owner contexts, then testing these contexts by sending real HTTP requests to your APIs.&lt;/p&gt;
&lt;p&gt;The scanner is now available via the Cloudflare API. To scan, set up your target environment, owner and attacker credentials, and upload your OpenAPI file with response schemas. The scanner will be available in the Cloudflare dashboard in a future release.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Access&lt;/strong&gt;: This feature is only available to API Shield subscribers via the Cloudflare API. We hope you will use the API for programmatic integration into your CI/CD pipelines and security dashboards.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Documentation&lt;/strong&gt;: Refer to the &lt;a href=&quot;https://developers.cloudflare.com/api-shield/security/vulnerability-scanner/&quot;&gt;developer documentation&lt;/a&gt; to start scanning your endpoints today.&lt;/p&gt;</description><pubDate>Mon, 09 Mar 2026 00:00:00 GMT</pubDate><product>API Shield</product><category>API Shield</category></item><item><title>API Shield - New BOLA Vulnerability Detection for API Shield</title><link>https://developers.cloudflare.com/changelog/post/2025-11-12-bola-attack-detection/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-11-12-bola-attack-detection/</guid><description>&lt;p&gt;Now, API Shield automatically searches for and highlights &lt;strong&gt;Broken Object Level Authorization (BOLA) attacks&lt;/strong&gt; on managed API endpoints. API Shield will highlight both BOLA enumeration attacks and BOLA pollution attacks, telling you what was attacked, by who, and for how long.&lt;/p&gt;
&lt;p&gt;You can find these attacks three different ways: Security Overview, Endpoint details, or Security Analytics. If these attacks are not found on your managed API endpoints, there will not be an overview card or security analytics suspicious activity card.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/bola-overview-card.hwcSeAkb_1MwSDq.webp&quot; alt=&quot;BOLA attack Overview card&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/bola-overview-drawer.DD2c0bxS_zw6Ec.webp&quot; alt=&quot;BOLA attack Overview drawer&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;From the endpoint details, you can select &lt;strong&gt;View attack&lt;/strong&gt; to find details about the BOLA attacker’s sessions.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/bola-endpoint-attack.UQP3MDkp_1Yhqqd.webp&quot; alt=&quot;BOLA attack endpoint details&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;From here, select &lt;strong&gt;View in Analytics&lt;/strong&gt; to observe attacker traffic over time for the last seven days.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/bola-analytics-drawer.DXzC6EJU_iXjmr.webp&quot; alt=&quot;BOLA attack analytics drawer&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;Your search will filter to traffic on that endpoint in the last seven days, along with the malicious session IDs found in the attack. Session IDs are hashed for privacy and will not be found in your origin logs. Refer to IP and JA4 fingerprint to cross-reference behavior at the origin.&lt;/p&gt;
&lt;p&gt;At any time, you can also start your investigation into attack traffic from Security Analytics by selecting the suspicious activity card.&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/bola-suspicious-card._B3GB3s4_STW1N.webp&quot; alt=&quot;Suspicious Activity card&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;We urge you to take all of this client information to your developer team to research the attacker behavior and ensure any broken authorization policies in your API are fixed at the source in your application, preventing further abuse.&lt;/p&gt;
&lt;p&gt;In addition, this release marks the end of the beta period for these scans. All Enterprise customers with API Shield subscriptions will see these new attacks if found on their zone.&lt;/p&gt;</description><pubDate>Wed, 12 Nov 2025 00:00:00 GMT</pubDate><product>API Shield</product><category>API Shield</category></item><item><title>API Shield - New API Posture Management for API Shield</title><link>https://developers.cloudflare.com/changelog/post/2025-03-18-api-posture-management/</link><guid isPermaLink="true">https://developers.cloudflare.com/changelog/post/2025-03-18-api-posture-management/</guid><description>&lt;p&gt;Now, API Shield &lt;strong&gt;automatically&lt;/strong&gt; labels your API inventory with API-specific risks so that you can track and manage risks to your APIs.&lt;/p&gt;
&lt;p&gt;View these risks in &lt;a href=&quot;https://developers.cloudflare.com/api-shield/management-and-monitoring/&quot;&gt;Endpoint Management&lt;/a&gt; by label:&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/endpoint-management-label.BDmf8Ai1_ZM5mgU.webp&quot; alt=&quot;A list of endpoint management labels&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;...or in &lt;a href=&quot;https://developers.cloudflare.com/security-center/security-insights/&quot;&gt;Security Center Insights&lt;/a&gt;:&lt;/p&gt;
&lt;starlight-image-zoom-zoomable&gt;&lt;img src=&quot;https://developers.cloudflare.com/_astro/posture-management-insight.7vB7mzGI_Z1HKoUN.webp&quot; alt=&quot;An example security center insight&quot;&gt;&lt;/starlight-image-zoom-zoomable&gt;
&lt;p&gt;API Shield will scan for risks on your API inventory daily. Here are the new risks we&apos;re scanning for and automatically labelling:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;cf-risk-sensitive&lt;/strong&gt;: applied if the customer is subscribed to the &lt;a href=&quot;https://developers.cloudflare.com/waf/managed-rules/reference/sensitive-data-detection/&quot;&gt;sensitive data detection ruleset&lt;/a&gt; and the WAF detects sensitive data returned on an endpoint in the last seven days.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;cf-risk-missing-auth&lt;/strong&gt;: applied if the customer has configured a session ID and no successful requests to the endpoint contain the session ID.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;cf-risk-mixed-auth&lt;/strong&gt;: applied if the customer has configured a session ID and some successful requests to the endpoint contain the session ID while some lack the session ID.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;cf-risk-missing-schema&lt;/strong&gt;: added when a learned schema is available for an endpoint that has no active schema.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;cf-risk-error-anomaly&lt;/strong&gt;: added when an endpoint experiences a recent increase in response errors over the last 24 hours.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;cf-risk-latency-anomaly&lt;/strong&gt;: added when an endpoint experiences a recent increase in response latency over the last 24 hours.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;cf-risk-size-anomaly&lt;/strong&gt;: added when an endpoint experiences a spike in response body size over the last 24 hours.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In addition, API Shield has two new &apos;beta&apos; scans for &lt;strong&gt;Broken Object Level Authorization (BOLA) attacks&lt;/strong&gt;. If you&apos;re in the beta, you will see the following two labels when API Shield suspects an endpoint is suffering from a BOLA vulnerability:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;cf-risk-bola-enumeration&lt;/strong&gt;: added when an endpoint experiences successful responses with drastic differences in the number of unique elements requested by different user sessions.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;cf-risk-bola-pollution&lt;/strong&gt;: added when an endpoint experiences successful responses where parameters are found in multiple places in the request.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;We are currently accepting more customers into our beta. Contact your account team if you are interested in BOLA attack detection for your API.&lt;/p&gt;
&lt;p&gt;Refer to the &lt;a href=&quot;https://blog.cloudflare.com/cloudflare-security-posture-management/&quot; target=&quot;_blank&quot;&gt;blog post&lt;/a&gt; for more information about Cloudflare&apos;s expanded posture management capabilities.&lt;/p&gt;</description><pubDate>Tue, 18 Mar 2025 00:00:00 GMT</pubDate><product>API Shield</product><category>API Shield</category></item></channel></rss>