Cloudflare Client-Side Security Now Open to All Users
Cloudflare expands its Client-Side Security suite to Pro and Business plans, using a cascading AI model to detect malicious scripts and supply chain attacks.
On March 30, 2026, Cloudflare expanded its Client-Side Security suite to all self-serve customers. The update introduces a cascading AI detection architecture to identify malicious browser-side scripts. For developers managing e-commerce sites or handling sensitive user data, this shifts the baseline for defending against modern skimmers and frontend vulnerabilities.
Access and Compliance Monitoring
Cloudflare Client-Side Security Advanced is now directly available to Pro and Business plan users through the dashboard. This removes the previous enterprise sales requirement for advanced features. Users on the free tier receive complimentary domain-based threat intelligence to block connections to known malicious domains.
The Advanced tier includes automated code-change monitoring. If you process payments, this fulfills the specific monitoring mandates of PCI DSS v4 Requirement 11.6.1. It provides immediate visibility into unauthorized JavaScript modifications without requiring third-party auditing software.
Cascading Detection Pipeline
The system processes approximately 3.5 billion scripts daily using a two-stage detection pipeline. High-traffic environments generate significant noise from modern web frameworks. To maintain catch rates without overwhelming security teams with alerts, Cloudflare splits the analysis.
The first stage uses a Graph Neural Network (GNN). The GNN converts JavaScript code into an Abstract Syntax Tree (AST) to perform structural analysis. It evaluates logical patterns to classify the script’s intent. This allows the system to identify data exfiltration routines even within heavily obfuscated code.
Scripts flagged by the GNN trigger a secondary evaluation. Cloudflare passes these suspicious files to gpt-oss-120b, an open-source large language model, for a contextual second opinion. This AI inference runs directly at the edge using Cloudflare Workers AI.
This cascading approach reduces false positives by up to 200x compared to relying on the GNN alone. It preserves the system’s ability to catch zero-day exploits while drastically reducing alert fatigue. Flagged scripts are automatically logged to Cloudflare R2 to support posterior auditing and continuous model improvement.
Target Vectors and Supply Chain Vulnerabilities
Enterprise zones currently run an average of 2,200 external scripts. Small and medium-sized webshops rely heavily on third-party libraries, creating massive attack surfaces. Recent supply chain attacks demonstrate the fragility of modern web development ecosystems.
In September 2025, attackers compromised 18 popular npm packages with crypto-stealing code. By January 2026, researchers found browser-side keyloggers harvesting credentials on a major U.S. bank’s merchandise store. Platforms like Magento are frequent targets for these infections. Without dedicated client-side monitoring, malicious code can operate undetected for weeks.
Review your third-party script dependencies and enable the free domain-based threat intelligence if your domains route through Cloudflare. If your application handles payment details or sensitive user profiles, map your current client-side monitoring against the PCI DSS v4 requirements to determine if the Advanced tier is necessary for your compliance posture.
Get Insanely Good at AI
The book for developers who want to understand how AI actually works. LLMs, prompt engineering, RAG, AI agents, and production systems.
Keep Reading
Fine-Tuning vs RAG: When to Use Each Approach
RAG changes what the model knows. Fine-tuning changes how it behaves. Here's when to use each approach, their real tradeoffs, and why the answer is usually both.
Cisco Source Code Stolen via Trivy Supply Chain Breach
Cisco confirms a major data breach involving stolen AI product source code and AWS keys following a malicious compromise of the Trivy vulnerability scanner.
Mercor Hit by Cyberattack via LiteLLM Supply Chain Breach
AI startup Mercor confirmed a data breach after hackers compromised the open-source LiteLLM project to steal internal data and credentials.
LiteLLM Ditches Delve After Malware Breach and Audit Scandal
LiteLLM terminates its relationship with compliance startup Delve following a major PyPI supply chain attack and allegations of fraudulent SOC 2 certifications.
Claude AI Finds Critical RCE Bugs in Vim and Emacs
Researchers used Anthropic's Claude to discover zero-day vulnerabilities in Vim and Emacs that allow code execution simply by opening a file.