Use Cloud Run Threat Detection Stay organized with collections Save and categorize content based on your preferences.
Cloud Run Threat Detectionis a built-in service of Security Command Center that continuously monitors the state ofCloud Run resources to detect the most common runtime attacks. IfCloud Run Threat Detection detects an attack, it generates afinding in Security Command Center in near-real time.
Cloud Run Threat Detection's runtime detectors monitor the scanned resources for suspiciousbinaries and libraries and uses natural language processing (NLP) to detectmalicious Bash and Python code. These runtime detectors support onlyCloud Run resources that run on thesecond generation execution environment.If you don't specify an execution environment and use Cloud Run Threat Detection,Cloud Run sets the second generation environment by default foryour resources.
For instructions on how to configure threat detection in your Cloud Runresources, seeUse Cloud Run Threat Detectionin the Security Command Center documentation.
Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2026-02-19 UTC.