Page Shield Alerts & Notifications
Page Shield continuously monitors all JavaScript resources loaded by visitors. When something changes, you get an alert. Here's what each alert type looks like and when it fires.
Unknown script appeared on checkout page
When this fires: A script URL that Page Shield has never seen before starts loading on your site. This is the first signal that something may have changed — either intentionally (new vendor added) or maliciously (injection).
trusted-vendor.js content hash changed
When this fires: A known script's content changes (different hash). This catches supply-chain compromises where an attacker modifies a vendor's script without changing the URL.
Formjacking / data exfiltration patterns found
When this fires: Page Shield's ML-powered classifier identifies malicious patterns such as credit card skimming, keylogging, or data exfiltration in a script's code. This is the highest-severity alert.
Script connecting to known malicious domain
When this fires: Page Shield detects outbound connections from scripts to domains flagged by Cloudflare's threat intelligence feeds. Even if the script itself wasn't flagged, the connection target raises a red flag.
Notification Channels
Page Shield alerts can be routed to multiple destinations so the right team is notified immediately.
Configuring Alerts
- 1. Go to Cloudflare Dashboard → Security → Page Shield → Policies
- 2. Under Notifications, click Add Notification
- 3. Choose the alert type(s): New Scripts, Code Changed, Malicious Code
- 4. Select delivery method (email, webhook, PagerDuty)
- 5. Optionally filter by page path or script URL patterns
- 6. Save — alerts are active immediately