The tweet discusses a security concern involving Cloudflare, which acts mainly as a Web Application Firewall (WAF). The message highlights a scenario where if Cloudflare's WAF functionality is unavailable, their system may bypass inspecting or protecting traffic, potentially creating a security risk for customers. Specifically, the bypass here is related to the unavailability of the WAF service rather than a typical exploit payload. This means that if the protective WAF mechanism is down, malicious traffic could pass through without scrutiny, which is a significant concern for enterprise customers who rely on Cloudflare for strong security. Additionally, the tweet notes that Cloudflare covers transport security, implying that comparing it with other WAFs may not be straightforward because of differences in scope of protection. Overall, the issue raised is a procedural or operational bypass related to WAF downtime or disabling, emphasizing the importance of continuous protection in enterprise security environments.
Also because CloudFlare is mostly a WAF and if they bypass their traffic when their WAF function is not available, that would create a security concern on their customers. You guys cover transport as well, so it is not apples with apples.
In enterprises generally security >…
— Oscar GF | Starke Finance (@0xTheDCguy) December 14, 2025