Skip to content
Briefings are running a touch slower this week while we rebuild the foundations.See roadmap
CA
ProductUS

Cloudflare AI Gateway

Cloudflare's AI traffic routing and caching gateway, positioned in the same AI-proxy product category as LiteLLM.

Last refreshed: 20 May 2026 · Appears in 1 active topic

Key Question

If the LiteLLM breach proves AI proxies are targets, does Cloudflare AI Gateway inherit the same risk?

Timeline for Cloudflare AI Gateway

#48 May

Mentioned in: LiteLLM SQL injection hits in 36 hours

Cybersecurity: Threats and Defences
View full timeline →
Common Questions
Was Cloudflare AI Gateway hacked like LiteLLM?
No. GTIG's May 2026 report mentioned Cloudflare AI Gateway as occupying the same architectural category as LiteLLM (an AI traffic proxy) but did not name it as a victim of UNC6780's operations. GTIG noted it had not assessed whether UNC6780 attempted to target Cloudflare.Source: GTIG
Is Cloudflare AI Gateway safer than LiteLLM?
Cloudflare AI Gateway is a commercial product backed by Cloudflare's enterprise security engineering, whereas LiteLLM is an open-source library without centralised customer notification or mandatory security reviews. However the LiteLLM breach raises due-diligence requirements for the entire AI-proxy category, not just open-source options.Source: Rapid7 / GTIG

Background

Cloudflare AI Gateway is a Cloudflare product that routes, caches, and monitors enterprise traffic to large language model APIs including OpenAI, Anthropic, and others. It occupies the same architectural slot as LiteLLM and BerriAI, sitting between enterprise applications and frontier LLM providers and providing logging, rate limiting, and caching for AI API traffic. Unlike LiteLLM, Cloudflare AI Gateway is a commercial product with Cloudflare's enterprise security engineering, DDoS protection, and global network infrastructure behind it.

GTIG's May 2026 report named Cloudflare AI Gateway as sitting in the same product category as LiteLLM for the purpose of supply-chain risk comparison. GTIG did not name Cloudflare AI Gateway as a victim of UNC6780's operations, and GTIG's report does not indicate whether UNC6780 attempted to target Cloudflare's infrastructure. The mention serves to contextualise the risk category: any product that sits as middleware between enterprise applications and LLM providers is now a target category, not a safe default.

For security practitioners, the Cloudflare AI Gateway comparison illustrates a procurement tension: open-source proxies like LiteLLM offer flexibility and cost efficiency but lack the commercial security engineering and patch Velocity of products like Cloudflare AI Gateway. The LiteLLM breach does not make Cloudflare AI Gateway the de facto SAFE alternative; it raises the bar for due diligence on the entire category.

Source Material