
Research
/Security News
Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign
Bitwarden CLI 2026.4.0 was compromised in the Checkmarx supply chain campaign after attackers abused a GitHub Action in Bitwarden’s CI/CD pipeline.
Cloudflare has launched a setup wizard allowing users to easily create and manage a security.txt file for vulnerability disclosure on their websites.

September 30, 2024
2 min read


Cloudflare has added a new configuration wizard to its dashboard that allows users to quickly set up a security.txt file. This file format was proposed as a standard for aiding in security vulnerability disclosure. It defines a machine-parsable format where organizations can identify the proper reporting channels and define their security policies.
The setup wizard can be found under Security > Settings. It’s disabled by default.

Once enabled, Cloudflare users can use the form to create and manage a security.txt. It includes all the standard fields outlined in the security.txt specification, including contact information, encryption, policy, hiring, etc. It is saved by default to /.well-known/, which is the specified path for web-based services.

In 2020, Cloudflare launched support for the security.txt initiative through Workers, linking to their account on HackerOne for security reporting. They included a technical tutorial for deploying and updating the security.txt file through a non-trivial process but also open sourced the Worker itself for anyone who wanted to deploy this service onto their Cloudflare zone.

Prior to this new setup wizard, manual creation and configuration through a Worker was the most common way to set up the file.
This user-friendly implementation may help with adoption of security.txt, as Cloudflare sits in front of roughly 20% of the web. This file format has already been implemented by Google, Facebook, GitHub, the UK government, and many other organizations. The new setup wizard is available on Cloudflare’s free plan, which may also help increase adoption of the initiative.
As security.txt is designed to be a machine-parsable file, it has naturally already attracted spam bots.
Clouflare’s new setting for enabling security.txt was first spotted in the wild by Troy Hunt, who tweeted about it. In response, several commenters noted that their own usage of security.txt has unfortunately come with spam bots sending template messages for bounties.
Similarly, others discussing the new feature on Mastodon said they have so far only had spam interactions after deploying a security.txt file.

Although the Contact field is required, the FAQs for security.txt states that the email value is optional. Those who don’t want to expose their email address to spam bots can elect to use a different contact method.
Cloudflare’s docs for the feature specify three different options:
(Required) Contact: You can enter one of the following to contact you about security issues:
The dashboard setting for this appears to have been soft launched but has not yet been officially announced. Cloudflare plans to publish more details about the new security.txt setup wizard soon.

Subscribe to our newsletter
Get notified when we publish new security blog posts!

Research
/Security News
Bitwarden CLI 2026.4.0 was compromised in the Checkmarx supply chain campaign after attackers abused a GitHub Action in Bitwarden’s CI/CD pipeline.

Research
/Security News
Docker and Socket have uncovered malicious Checkmarx KICS images and suspicious code extension releases in a broader supply chain compromise.

Security News
NIST will stop enriching most CVEs under a new risk-based model, narrowing the NVD's scope as vulnerability submissions continue to surge.