Sensitive information reference
Arcjet Sensitive Information Detection protects against clients sending you sensitive information such as PII that you do not wish to handle.
Plan availability
Arcjet sensitive information detection availability depends depends on your pricing plan.
Plan | Sensitive information detection |
---|---|
Free | No |
Pro | Yes |
Enterprise | Custom |
Configuration
Sensitive information detection is configured by allowing or denying a subset of
sensitive information. The allow
and deny
lists are mutually-exclusive, such
that using allow
will result in a DENY
decision for any detected sensitive
information that is not specified in the allow
list and using deny
will
result in an ALLOW
decision for any detected sensitive information that is not
specified in the deny
list.
The arcjet
client can be configured with one or more Sensitive information
rules, which are constructed with the
sensitiveInfo(options: SensitiveInfoOptionsAllow | SensitiveInfoOptionsDeny)
function and configured by SensitiveInfoOptionsAllow
or
SensitiveInfoOptionsDeny
:
type SensitiveInfoOptionsAllow = { mode?: "LIVE" | "DRY_RUN"; allow?: Array<ArcjetSensitiveInfoType>; contextWindowSize?: number; // You can also provide a custom detection function to detect other types // of sensitive information (see below). detect?: (tokens: string[]) -> Array<SensitiveInfoType | undefined>;};
type SensitiveInfoOptionsDeny = { mode?: "LIVE" | "DRY_RUN"; deny?: Array<ArcjetSensitiveInfoType>; contextWindowSize?: number; // You can also provide a custom detection function to detect other types // of sensitive information (see below). detect?: (tokens: string[]) -> Array<SensitiveInfoType | undefined>;};
type ArcjetSensitiveInfoType = | "EMAIL" | "PHONE_NUMBER" | "IP_ADDRESS" | "CREDIT_CARD_NUMBER";
Guards and routes
Arcjet can be integrated into NestJS in several places using NestJS guards or directly within the route controller:
- Global guard: Applies Arcjet rules on every request, but does not allow you to configure rules per route.
- Per route guard: Allows you to configure rules per route, but requires you to add the guard to every route and has limited flexibility.
- Within route: Requires some code duplication, but allows maximum flexibility because you can customize the rules and response.
Global guard
A global guard can be configured in src/app.module.ts
.
import { ArcjetModule, sensitiveInfo } from "@arcjet/nest";import { Module } from "@nestjs/common";import { ConfigModule } from "@nestjs/config";
@Module({ imports: [ ConfigModule.forRoot({ isGlobal: true, envFilePath: ".env.local", }), ArcjetModule.forRoot({ isGlobal: true, key: process.env.ARCJET_KEY!, rules: [ // This allows all sensitive entities other than email addresses sensitiveInfo({ mode: "LIVE", // Will block requests, use "DRY_RUN" to log only // allow: ["EMAIL"], Will block all sensitive information types other than email. deny: ["EMAIL"], // Will block email addresses }), ], }), // ... other modules ],})export class AppModule {}
This can then be added to the controller for all the routes you wish to protect with Arcjet.
import { ArcjetGuard } from "@arcjet/nest";import { Body, Controller, Injectable, Post, Req, UseGuards,} from "@nestjs/common";
// This would normally go in your controller file e.g.// src/page/page.controller.ts@Controller("page")// Uses the ArcjetGuard to protect the controller with the default rules defined// in app.module.ts. Using a guard makes it easy to apply Arcjet rules, but you// don't get access to the decision.@UseGuards(ArcjetGuard)export class PageController { constructor(private readonly pageService: PageService) {}
@Post() async index(@Req() req: Request, @Body() body: string) { return this.pageService.message(body); }}
// This would normally go in your service file e.g.// src/page/page.service.ts@Injectable()export class PageService { message(content: string): { message: string; submittedContent: string } { return { message: "Hello world", submittedContent: content, }; }}
Per route guard
A per route guard can be configured in the controller for each route you wish to
protect with specific Arcjet rules. The client created in src/app.module.ts
is automatically passed to the guard.
The rules will be applied and a generic error returned if the result is DENY
.
import { WithArcjetRules, sensitiveInfo } from "@arcjet/nest";import { Body, Injectable, Post, Req } from "@nestjs/common";
// This would normally go in your controller file e.g.// src/page/page.controller.ts// Attaches the ArcjetGuard to the controller to protect it with the specified// rules extended from the global rules defined in app.module.ts.@WithArcjetRules([ // This allows all sensitive entities other than email addresses sensitiveInfo({ mode: "LIVE", // Will block requests, use "DRY_RUN" to log only // allow: ["EMAIL"], Will block all sensitive information types other than email. deny: ["EMAIL"], // Will block email addresses }),])export class PageController { constructor(private readonly pageService: PageService) {}
@Post() async index(@Req() req: Request, @Body() body: string) { return this.pageService.message(body); }}
// This would normally go in your service file e.g.// src/page/page.service.ts@Injectable()export class PageService { message(content: string): { message: string; submittedContent: string } { return { message: "Hello world", submittedContent: content, }; }}
Within route
Call Arcjet from within the route controller to have maximum flexibility.
import { ARCJET, type ArcjetNest, ArcjetRuleResult, sensitiveInfo,} from "@arcjet/nest";import { Body, Controller, HttpException, HttpStatus, Inject, Injectable, Post, Req,} from "@nestjs/common";import type { Request } from "express";
function isSpoofed(result: ArcjetRuleResult) { return ( // You probably don't want DRY_RUN rules resulting in a denial // since they are generally used for evaluation purposes but you // could log here. result.state !== "DRY_RUN" && result.reason.isBot() && result.reason.isSpoofed() );}
// This would normally go in your service file e.g.// src/page/page.service.ts@Injectable()export class PageService { message(content: string): { message: string; submittedContent: string } { return { message: "Hello world", submittedContent: content, }; }}
// This would normally go in your controller file e.g.// src/page/page.controller.ts@Controller("page")// Sets up the Arcjet protection without using a guard so we can access the// decision and use it in the controller.export class PageController { constructor( private readonly pageService: PageService, @Inject(ARCJET) private readonly arcjet: ArcjetNest, ) {}
@Post() async index(@Req() req: Request, @Body() body: string) { const decision = await this.arcjet .withRule( // This allows all sensitive entities other than email addresses sensitiveInfo({ mode: "LIVE", // Will block requests, use "DRY_RUN" to log only // allow: ["EMAIL"], Will block all sensitive information types other than email. deny: ["EMAIL"], // Will block email addresses }), ) .protect(req);
if (decision.isDenied()) { if (decision.reason.isBot()) { throw new HttpException("No bots allowed", HttpStatus.FORBIDDEN); } else { throw new HttpException("Forbidden", HttpStatus.FORBIDDEN); } }
// Arcjet Pro plan verifies the authenticity of common bots using IP data. // Verification isn't always possible, so we recommend checking the results // separately. // https://docs.arcjet.com/bot-protection/reference#bot-verification if (decision.results.some(isSpoofed)) { throw new HttpException("Forbidden", HttpStatus.FORBIDDEN); }
return this.pageService.message(body); }}
Per route vs hooks
Bot protection rules can be configured in two ways:
- Per route: The rule is defined in the route handler itself. This allows you to configure the rule alongside the code it is protecting which is useful if you want to use the decision to add context to your own code. However, it means rules are not located in a single place.
- Hooks: The rule is defined as a hook. This allows you to configure rules in a single place or apply them globally to all routes, but it means the rules are not located alongside the code they are protecting.
Per route
This configures bot protection on a single route.
import { env } from "$env/dynamic/private";import arcjet, { sensitiveInfo } from "@arcjet/sveltekit";import { error, type RequestEvent } from "@sveltejs/kit";
const aj = arcjet({ key: env.ARCJET_KEY!, // Get your site key from https://app.arcjet.com rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), ],});
export async function load(event: RequestEvent) { const decision = await aj.protect(event);
if (decision.isDenied()) { return error(403, "You are suspicious!"); }
return {};}
import { env } from "$env/dynamic/private";import arcjet, { sensitiveInfo } from "@arcjet/sveltekit";import { error } from "@sveltejs/kit";
const aj = arcjet({ key: env.ARCJET_KEY, // Get your site key from https://app.arcjet.com rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), ],});
export async function load(event) { const decision = await aj.protect(event);
if (decision.isDenied()) { return error(403, "You are suspicious!"); }
return {};}
Hooks
This will run on every request to your SvelteKit app - see the SvelteKit Hooks docs for details.
import { env } from "$env/dynamic/private";import arcjet, { sensitiveInfo } from "@arcjet/sveltekit";import { error } from "@sveltejs/kit";
const aj = arcjet({ key: env.ARCJET_KEY, // Get your site key from https://app.arcjet.com rules: [ // This allows all sensitive entities other than email addresses and those containing a dash character. sensitiveInfo({ mode: "LIVE", // Will block requests, use "DRY_RUN" to log only // allow: ["EMAIL"], Will block all sensitive information types other than email. deny: ["EMAIL"], // Will block email addresses }), ],});
export async function handle({ event, resolve }) { const decision = await aj.protect(event);
if (decision.isDenied()) { return error(400, "Bad request - sensitive information detected"); }
return resolve(event);}
import { env } from "$env/dynamic/private";import arcjet, { sensitiveInfo } from "@arcjet/sveltekit";import { error, type RequestEvent } from "@sveltejs/kit";
const aj = arcjet({ key: env.ARCJET_KEY!, // Get your site key from https://app.arcjet.com rules: [ // This allows all sensitive entities other than email addresses and those containing a dash character. sensitiveInfo({ mode: "LIVE", // Will block requests, use "DRY_RUN" to log only // allow: ["EMAIL"], Will block all sensitive information types other than email. deny: ["EMAIL"], // Will block email addresses }), ],});
export async function handle({ event, resolve,}: { event: RequestEvent; resolve: (event: RequestEvent) => Response | Promise<Response>;}): Promise<Response> { const decision = await aj.protect(event);
if (decision.isDenied()) { return error(400, "Bad request - sensitive information detected"); }
return resolve(event);}
Avoiding double protection with hooks
If you use Arcjet in hooks and individual routes, you need to be careful that Arcjet is not running multiple times per request. This can be avoided by excluding the individual routes before running Arcjet in the hook.
For example, if you already have a sensitive info rule defined in the API route
at /api/arcjet
, you can exclude it from the hook like this:
import { env } from "$env/dynamic/private";import arcjet, { detectBot } from "@arcjet/sveltekit";import { error, type RequestEvent } from "@sveltejs/kit";
const aj = arcjet({ key: env.ARCJET_KEY!, rules: [ detectBot({ mode: "LIVE", allow: [], // "allow none" will block all detected bots }), ],});
export async function handle({ event, resolve,}: { event: RequestEvent; resolve: (event: RequestEvent) => Response | Promise<Response>;}): Promise<Response> { // Ignore routes that extend the Arcjet rules // - they will call `.protect` themselves const filteredRoutes = ["/api/arcjet"]; if (filteredRoutes.includes(event.url.pathname)) { // return - route will handle protecttion return resolve(event); }
const decision = await aj.protect(event);
if (decision.isDenied()) { return error(403, "Forbidden"); }
return resolve(event);}
Per route vs middleware
Bot protection rules can be configured in two ways:
- Per API route: The rule is defined in the API route itself. This allows you to configure the rule alongside the code it is protecting which is useful if you want to use the decision to add context to your own code. However, it means rules are not located in a single place.
- Middleware: The rule is defined in the middleware. This allows you to configure rules in a single place or apply them globally to all routes, but it means the rules are not located alongside the code they are protecting.
Per route
This configures bot protection on a single route.
import arcjet, { sensitiveInfo } from "@arcjet/next";
const aj = arcjet({ key: process.env.ARCJET_KEY, rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), ],});
export default async function handler(req, res) { const decision = await aj.protect(req);
if (decision.isDenied() && decision.reason.isSensitiveInfo()) { return res .status(400) .json({ error: "Unexpected sensitive info received" }); // Returning the reason is useful for debugging, but don't return it to the // client in production // .json({ error: "You are suspicious!", reason: decision.reason }); }
res.status(200).json({ name: "Hello world" });}
import arcjet, { sensitiveInfo } from "@arcjet/next";import type { NextApiRequest, NextApiResponse } from "next";
const aj = arcjet({ key: process.env.ARCJET_KEY!, rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), ],});
export default async function handler( req: NextApiRequest, res: NextApiResponse,) { const decision = await aj.protect(req);
if (decision.isDenied() && decision.reason.isSensitiveInfo()) { return res .status(400) .json({ error: "Unexpected sensitive info received" }); // Returning the reason is useful for debugging, but don't return it to the // client in production // .json({ error: "You are suspicious!", reason: decision.reason }); }
res.status(200).json({ name: "Hello world" });}
import arcjet, { sensitiveInfo } from "@arcjet/next";import { NextResponse } from "next/server";
const aj = arcjet({ key: process.env.ARCJET_KEY!, rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), ],});
export async function POST(req: Request) { const decision = await aj.protect(req);
if (decision.isDenied() && decision.reason.isSensitiveInfo()) { return NextResponse.json( { error: "Unexpected sensitive info received", // Useful for debugging, but don't return it to the client in // production // reason: decision.reason, }, { status: 400 }, ); }
return NextResponse.json({ message: "Hello world", });}
import arcjet, { sensitiveInfo } from "@arcjet/next";import { NextResponse } from "next/server";
const aj = arcjet({ key: process.env.ARCJET_KEY, rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), ],});
export async function POST(req) { const decision = await aj.protect(req);
if (decision.isDenied() && decision.reason.isSensitiveInfo()) { return NextResponse.json( { error: "Unexpected sensitive info received", // Useful for debugging, but don't return it to the client in // production // reason: decision.reason, }, { status: 400 }, ); }
return NextResponse.json({ message: "Hello world", });}
Middleware
Create a file called middleware.ts
in your project root (at the same level as
pages
or app
or inside src
):
import arcjet, { createMiddleware, sensitiveInfo } from "@arcjet/next";export const config = { // matcher tells Next.js which routes to run the middleware on. // This runs the middleware on all routes except for static assets. matcher: ["/((?!_next/static|_next/image|favicon.ico).*)"],};const aj = arcjet({ key: process.env.ARCJET_KEY!, // Get your site key from https://app.arcjet.com rules: [ // Prevent your app receiving unexpected sensitive info sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), ],});// Pass any existing middleware with the optional existingMiddleware propexport default createMiddleware(aj);
Create a file called middleware.js
in your project root (at the same level as
pages
or app
or inside src
):
import arcjet, { createMiddleware, sensitiveInfo } from "@arcjet/next";export const config = { // matcher tells Next.js which routes to run the middleware on. // This runs the middleware on all routes except for static assets. matcher: ["/((?!_next/static|_next/image|favicon.ico).*)"],};const aj = arcjet({ key: process.env.ARCJET_KEY, // Get your site key from https://app.arcjet.com rules: [ // Prevent your app receiving unexpected sensitive info sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), ],});// Pass any existing middleware with the optional existingMiddleware propexport default createMiddleware(aj);
Avoiding double protection with middleware
If you use Arcjet in middleware and individual routes, you need to be careful that Arcjet is not running multiple times per request. This can be avoided by excluding the API route from the middleware matcher.
For example, if you already have a sensitive info rule defined in the API route
at /api/hello
, you can exclude it from the middleware by specifying a matcher
in /middleware.ts
:
import arcjet, { createMiddleware, sensitiveInfo } from "@arcjet/next";export const config = { // The matcher prevents the middleware executing on static assets and the // /api/hello API route because you already installed Arcjet directly matcher: ["/((?!_next/static|_next/image|favicon.ico|api/hello).*)"],};const aj = arcjet({ key: process.env.ARCJET_KEY!, rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), ],});// Pass any existing middleware with the optional existingMiddleware propexport default createMiddleware(aj);
Pages & Server Actions
Arcjet can be used inside Next.js middleware, API routes, pages, server components, and server actions. Client components cannot be protected because they run on the client only.
See the Next.js SDK reference for examples of pages / page components and server actions.
Decision
Arcjet also provides a single protect
function that is used to execute your
protection rules.
If you are using a global guard or per route
guard then protect
is called for you behind the scenes. If you add Arcjet
within a route then you call it directly.
This function returns a Promise
that resolves to an
ArcjetDecision
object. This contains the following properties:
id
(string
) - The unique ID for the request. This can be used to look up the request in the Arcjet dashboard. It is prefixed withreq_
for decisions involving the Arcjet cloud API. For decisions taken locally, the prefix islreq_
.conclusion
(ArcjetConclusion
) - The final conclusion based on evaluating each of the configured rules. If you wish to accept Arcjet’s recommended action based on the configured rules then you can use this property.reason
(ArcjetReason
) - An object containing more detailed information about the conclusion.results
(ArcjetRuleResult[]
) - An array ofArcjetRuleResult
objects containing the results of each rule that was executed.ip
(ArcjetIpDetails
) - An object containing Arcjet’s analysis of the client IP address. See the SDK reference for more information.
You check if a deny conclusion has been returned by a sensitive info rule by using
decision.isDenied()
and decision.reason.isSensitiveInfo()
respectively.
You can iterate through the results and check whether a sensitive info rule was applied:
for (const result of decision.results) { console.log("Rule Result", result);}
This example will log the full result as well as the sensitive info rule:
import arcjet, { sensitiveInfo } from "@arcjet/bun";import { env } from "bun";
const aj = arcjet({ key: env.ARCJET_KEY!, // Get your site key from https://app.arcjet.com rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), ],});
export default { port: 3000, fetch: aj.handler(async (req) => { const decision = await aj.protect(req);
for (const result of decision.results) { console.log("Rule Result", result);
if (result.reason.isSensitiveInfo()) { console.log("Sensitive info rule", result); } }
if (decision.isDenied()) { return new Response("Forbidden", { status: 403 }); }
return new Response("Hello world"); }),};
import arcjet, { sensitiveInfo } from "@arcjet/bun";import { env } from "bun";
const aj = arcjet({ key: env.ARCJET_KEY, // Get your site key from https://app.arcjet.com rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), ],});
export default { port: 3000, fetch: aj.handler(async (req) => { const decision = await aj.protect(req);
for (const result of decision.results) { console.log("Rule Result", result);
if (result.reason.isSensitiveInfo()) { console.log("Sensitive info rule", result); } }
if (decision.isDenied()) { return new Response("Forbidden", { status: 403 }); }
return new Response("Hello world"); }),};
import arcjet, { sensitiveInfo } from "@arcjet/next";import { NextResponse } from "next/server";
const aj = arcjet({ key: process.env.ARCJET_KEY!, // Tracking by ip.src is the default if not specified //characteristics: ["ip.src"], rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), ],});
export async function POST(req: Request) { const decision = await aj.protect(req);
for (const result of decision.results) { console.log("Rule Result", result);
if (result.reason.isSensitiveInfo()) { console.log("Sensitive info rule", result); } }
if (decision.isDenied()) { return NextResponse.json({ error: "Forbidden" }, { status: 403 }); }
return NextResponse.json({ message: "Hello world", });}
import arcjet, { sensitiveInfo } from "@arcjet/next";import { NextResponse } from "next/server";
const aj = arcjet({ key: process.env.ARCJET_KEY, // Tracking by ip.src is the default if not specified //characteristics: ["ip.src"], rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), ],});
export async function POST(req) { const decision = await aj.protect(req);
for (const result of decision.results) { console.log("Rule Result", result);
if (result.reason.isSensitiveInfo()) { console.log("Sensitive info rule", result); } }
if (decision.isDenied()) { return NextResponse.json({ error: "Forbidden" }, { status: 403 }); }
return NextResponse.json({ message: "Hello world", });}
import arcjet, { sensitiveInfo } from "@arcjet/next";
const aj = arcjet({ key: process.env.ARCJET_KEY, // Tracking by ip.src is the default if not specified //characteristics: ["ip.src"], rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), ],});
export default async function handler(req, res) { const decision = await aj.protect(req); console.log("Decision", decision);
for (const result of decision.results) { console.log("Rule Result", result);
if (result.reason.isSensitiveInfo()) { console.log("Sensitive info rule", result); } }
if (decision.isDenied()) { return res .status(403) .json({ error: "Forbidden", reason: decision.reason }); }
res.status(200).json({ name: "Hello world" });}
import arcjet, { sensitiveInfo } from "@arcjet/next";import type { NextApiRequest, NextApiResponse } from "next";
const aj = arcjet({ key: process.env.ARCJET_KEY!, // Tracking by ip.src is the default if not specified //characteristics: ["ip.src"], rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), ],});
export default async function handler( req: NextApiRequest, res: NextApiResponse,) { const decision = await aj.protect(req); console.log("Decision", decision);
for (const result of decision.results) { console.log("Rule Result", result);
if (result.reason.isSensitiveInfo()) { console.log("Sensitive info rule", result); } }
if (decision.isDenied()) { return res .status(403) .json({ error: "Forbidden", reason: decision.reason }); }
res.status(200).json({ name: "Hello world" });}
import { env } from "$env/dynamic/private";import arcjet, { sensitiveInfo } from "@arcjet/sveltekit";import { error, json, type RequestEvent } from "@sveltejs/kit";
const aj = arcjet({ key: env.ARCJET_KEY!, rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), ],});
export async function GET(event: RequestEvent) { const decision = await aj.protect(event);
for (const result of decision.results) { console.log("Rule Result", result);
if (result.reason.isSensitiveInfo()) { console.log("Sensitive info rule", result); } }
if (decision.isDenied()) { return error(403, "Forbidden"); }
return json({ message: "Hello world" });}
import arcjet, { sensitiveInfo } from "@arcjet/sveltekit";import { error, json } from "@sveltejs/kit";
const aj = arcjet({ key: env.ARCJET_KEY, rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), ],});
export async function GET(event) { const decision = await aj.protect(event);
for (const result of decision.results) { console.log("Rule Result", result);
if (result.reason.isSensitiveInfo()) { console.log("Sensitive info rule", result); } }
if (decision.isDenied()) { return error(403, "Forbidden"); }
return json({ message: "Hello world" });}
import arcjet, { shield, sensitiveInfo } from "@arcjet/remix";import type { ActionFunctionArgs } from "@remix-run/node";
const aj = arcjet({ key: process.env.ARCJET_KEY!, // Get your site key from https://app.arcjet.com characteristics: ["ip.src"], rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), shield({ mode: "LIVE", }), ],});
export async function action(args: ActionFunctionArgs) { const decision = await aj.protect(args);
for (const result of decision.results) { console.log("Rule Result", result);
if (result.reason.isSensitiveInfo()) { console.log("Sensitive info rule", result); }
if (result.reason.isShield()) { console.log("Shield protection rule", result); } }
if (decision.isDenied()) { if (decision.reason.isSensitiveInfo()) { return Response.json( { error: "Please don't send personal data." }, { status: 400 }, ); } else { return Response.json({ error: "Forbidden" }, { status: 403 }); } }
// We don't need to use the decision elsewhere, but you could return it to // the component return null;}
import arcjet, { shield, sensitiveInfo } from "@arcjet/remix";
const aj = arcjet({ key: process.env.ARCJET_KEY, // Get your site key from https://app.arcjet.com characteristics: ["ip.src"], rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), shield({ mode: "LIVE", }), ],});
export async function action(args) { const decision = await aj.protect(args);
for (const result of decision.results) { console.log("Rule Result", result);
if (result.reason.isSensitiveInfo()) { console.log("Sensitive info rule", result); }
if (result.reason.isShield()) { console.log("Shield protection rule", result); } }
if (decision.isDenied()) { if (decision.reason.isSensitiveInfo()) { return Response.json( { error: "Please don't send personal data." }, { status: 400 }, ); } else { return Response.json({ error: "Forbidden" }, { status: 403 }); } }
// We don't need to use the decision elsewhere, but you could return it to // the component return null;}
import arcjet, { sensitiveInfo } from "@arcjet/node";import http from "node:http";
const aj = arcjet({ key: process.env.ARCJET_KEY, // Get your site key from https://app.arcjet.com characteristics: ["ip.src"], rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), ],});
const server = http.createServer(async function (req, res) { const decision = await aj.protect(req);
for (const result of decision.results) { console.log("Rule Result", result);
if (result.reason.isRateLimit()) { console.log("Rate limit rule", result); } }
if (decision.isDenied()) { if (decision.reason.isSensitiveInfo()) { res.writeHead(400, { "Content-Type": "application/json" }); res.end( JSON.stringify({ error: "Unexpected sensitive info detected", reason: decision.reason, }), ); res.end(JSON.stringify({ error: "Forbidden" })); } else { res.writeHead(403, { "Content-Type": "application/json" }); res.end(JSON.stringify({ error: "Forbidden" })); } } else { res.writeHead(200, { "Content-Type": "application/json" }); res.end(JSON.stringify({ message: "Hello world" })); }});
server.listen(8000);
import arcjet, { sensitiveInfo, shield } from "@arcjet/node";import http from "node:http";
const aj = arcjet({ key: process.env.ARCJET_KEY!, // Get your site key from https://app.arcjet.com characteristics: ["ip.src"], rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), shield({ mode: "LIVE", }), ],});
const server = http.createServer(async function ( req: http.IncomingMessage, res: http.ServerResponse,) { const decision = await aj.protect(req);
for (const result of decision.results) { console.log("Rule Result", result);
if (result.reason.isSensitiveInfo()) { console.log("Sensitive info rule", result); }
if (result.reason.isShield()) { console.log("Shield protection rule", result); } }
if (decision.isDenied()) { if (decision.reason.isSensitiveInfo()) { res.writeHead(400, { "Content-Type": "application/json" }); res.end( JSON.stringify({ error: "Unexpected sensitive info detected", reason: decision.reason, }), ); res.end(JSON.stringify({ error: "Forbidden" })); } else { res.writeHead(403, { "Content-Type": "application/json" }); res.end(JSON.stringify({ error: "Forbidden" })); } } else { res.writeHead(200, { "Content-Type": "application/json" }); res.end(JSON.stringify({ message: "Hello world" })); }});
server.listen(8000);
import { ARCJET, type ArcjetNest, type ArcjetRuleResult, detectBot, sensitiveInfo,} from "@arcjet/nest";import { Body, Controller, HttpException, HttpStatus, Inject, Injectable, Logger, Post, Req,} from "@nestjs/common";import type { Request } from "express";
// This would normally go in your service file e.g.// src/page/page.service.ts@Injectable()export class PageService { message(content: string): { message: string; submittedContent: string } { return { message: "Hello world", submittedContent: content, }; }}
function isSpoofed(result: ArcjetRuleResult) { return ( // You probably don't want DRY_RUN rules resulting in a denial // since they are generally used for evaluation purposes but you // could log here. result.state !== "DRY_RUN" && result.reason.isBot() && result.reason.isSpoofed() );}
// This would normally go in your controller file e.g.// src/page/page.controller.ts@Controller("page")// Sets up the Arcjet protection without using a guard so we can access the// decision and use it in the controller.export class PageController { // Make use of the NestJS logger: https://docs.nestjs.com/techniques/logger // See // https://github.com/arcjet/example-nestjs/blob/ec742e58c8da52d0a399327182c79e3f4edc8f3b/src/app.module.ts#L29 // and https://github.com/arcjet/example-nestjs/blob/main/src/arcjet-logger.ts // for an example of how to connect Arcjet to the NestJS logger private readonly logger = new Logger(PageController.name);
constructor( private readonly pageService: PageService, @Inject(ARCJET) private readonly arcjet: ArcjetNest, ) {}
@Post() async index(@Req() req: Request, @Body() body: string) { const decision = await this.arcjet .withRule( detectBot({ mode: "LIVE", // will block requests. Use "DRY_RUN" to log only // configured with a list of bots to allow from // https://arcjet.com/bot-list allow: [], // blocks all automated clients }), ) .withRule( // This allows all sensitive entities other than email addresses sensitiveInfo({ mode: "LIVE", // Will block requests, use "DRY_RUN" to log only // allow: ["EMAIL"], Will block all sensitive information types other than email. deny: ["EMAIL"], // Will block email addresses }), ) .protect(req);
this.logger.log(`Arcjet: id = ${decision.id}`); this.logger.log(`Arcjet: decision = ${decision.conclusion}`);
for (const result of decision.results) { this.logger.log("Rule Result", result);
if (result.reason.isSensitiveInfo()) { this.logger.log("Sensitive info rule", result); }
if (result.reason.isBot()) { this.logger.log("Bot protection rule", result); } }
if (decision.isDenied()) { if (decision.reason.isBot()) { throw new HttpException("No bots allowed", HttpStatus.FORBIDDEN); } else if (decision.reason.isSensitiveInfo()) { throw new HttpException( "Unexpected sensitive info detected", HttpStatus.BAD_REQUEST, ); } else { throw new HttpException("Forbidden", HttpStatus.FORBIDDEN); } }
// Arcjet Pro plan verifies the authenticity of common bots using IP data. // Verification isn't always possible, so we recommend checking the decision // separately. // https://docs.arcjet.com/bot-protection/reference#bot-verification if (decision.results.some(isSpoofed)) { return new HttpException("Forbidden", HttpStatus.FORBIDDEN); }
return this.pageService.message(body); }}
Custom entity detection
When configuring Arcjet Sensitive Info you can provide a custom detect function, this enables you to detect entities that we don’t support out of the box using custom logic.
The function will take a list of tokens and must return a list of either
undefined
, if the corresponding token in the input list is not sensitive, or
the name of the entity if it does match. The number of tokens that are provided
to the function is controlled by the contextWindowSize
option, which defaults
to 1. If you need additional context to perform detections then you can increase
this value.
import arcjet, { sensitiveInfo } from "@arcjet/bun";import { env } from "bun";
// This function is called by the `sensitiveInfo` rule to perform custom detection on strings.function detectDash(tokens: string[]): Array<"CONTAINS_DASH" | undefined> { return tokens.map((token) => { if (token.includes("-")) { return "CONTAINS_DASH"; } });}
const aj = arcjet({ key: env.ARCJET_KEY!, // Get your site key from https://app.arcjet.com rules: [ sensitiveInfo({ deny: ["EMAIL", "CONTAINS_DASH"], mode: "LIVE", detect: detectDash, contextWindowSize: 2, }), ],});
export default { port: 3000, fetch: aj.handler(async (req) => { const decision = await aj.protect(req);
for (const result of decision.results) { console.log("Rule Result", result);
if (result.reason.isSensitiveInfo()) { console.log("Sensitive info rule", result); } }
if (decision.isDenied()) { return new Response("Forbidden", { status: 403 }); }
return new Response("Hello world"); }),};
import arcjet, { sensitiveInfo } from "@arcjet/bun";import { env } from "bun";
// This function is called by the `sensitiveInfo` rule to perform custom detection on strings.function detectDash(tokens) { return tokens.map((token) => { if (token.includes("-")) { return "CONTAINS_DASH"; } });}
const aj = arcjet({ key: env.ARCJET_KEY, // Get your site key from https://app.arcjet.com rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", detect: detectDash, contextWindowSize: 2, }), ],});
export default { port: 3000, fetch: aj.handler(async (req) => { const decision = await aj.protect(req);
for (const result of decision.results) { console.log("Rule Result", result);
if (result.reason.isSensitiveInfo()) { console.log("Sensitive info rule", result); } }
if (decision.isDenied()) { return new Response("Forbidden", { status: 403 }); }
return new Response("Hello world"); }),};
import arcjet, { sensitiveInfo } from "@arcjet/next";import { NextResponse } from "next/server";
// This function is called by the `sensitiveInfo` rule to perform custom detection on strings.function detectDash(tokens: string[]): Array<"CONTAINS_DASH" | undefined> { return tokens.map((token) => { if (token.includes("-")) { return "CONTAINS_DASH"; } });}
const aj = arcjet({ key: process.env.ARCJET_KEY!, // Get your site key from https://app.arcjet.com rules: [ sensitiveInfo({ deny: ["EMAIL", "CONTAINS_DASH"], mode: "LIVE", detect: detectDash, contextWindowSize: 2, }), ],});
export async function POST(req: Request) { const decision = await aj.protect(req);
for (const result of decision.results) { console.log("Rule Result", result);
if (result.reason.isSensitiveInfo()) { console.log("Sensitive info rule", result); } }
if (decision.isDenied()) { return NextResponse.json({ error: "Forbidden" }, { status: 403 }); }
return NextResponse.json({ message: "Hello world", });}
import arcjet, { sensitiveInfo } from "@arcjet/next";
// This function is called by the `sensitiveInfo` rule to perform custom detection on strings.function detectDash(tokens) { return tokens.map((token) => { if (token.includes("-")) { return "CONTAINS_DASH"; } });}
const aj = arcjet({ key: process.env.ARCJET_KEY, // Get your site key from https://app.arcjet.com rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", detect: detectDash, contextWindowSize: 2, }), ],});
export async function POST(req) { const decision = await aj.protect(req);
for (const result of decision.results) { console.log("Rule Result", result);
if (result.reason.isSensitiveInfo()) { console.log("Sensitive info rule", result); } }
if (decision.isDenied()) { return NextResponse.json({ error: "Forbidden" }, { status: 403 }); }
return NextResponse.json({ message: "Hello world", });}
import arcjet, { sensitiveInfo } from "@arcjet/next";
// This function is called by the `sensitiveInfo` rule to perform custom detection on strings.function detectDash(tokens) { return tokens.map((token) => { if (token.includes("-")) { return "CONTAINS_DASH"; } });}
const aj = arcjet({ key: process.env.ARCJET_KEY, // Get your site key from https://app.arcjet.com rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", detect: detectDash, contextWindowSize: 2, }), ],});
export default async function handler(req, res) { const decision = await aj.protect(req); console.log("Decision", decision);
for (const result of decision.results) { console.log("Rule Result", result);
if (result.reason.isSensitiveInfo()) { console.log("Sensitive info rule", result); } }
if (decision.isDenied()) { return res .status(403) .json({ error: "Forbidden", reason: decision.reason }); }
res.status(200).json({ name: "Hello world" });}
import arcjet, { sensitiveInfo } from "@arcjet/next";import type { NextApiRequest, NextApiResponse } from "next";
// This function is called by the `sensitiveInfo` rule to perform custom detection on strings.function detectDash(tokens: string[]): Array<"CONTAINS_DASH" | undefined> { return tokens.map((token) => { if (token.includes("-")) { return "CONTAINS_DASH"; } });}
const aj = arcjet({ key: process.env.ARCJET_KEY!, // Get your site key from https://app.arcjet.com rules: [ sensitiveInfo({ deny: ["EMAIL", "CONTAINS_DASH"], mode: "LIVE", detect: detectDash, contextWindowSize: 2, }), ],});
export default async function handler( req: NextApiRequest, res: NextApiResponse,) { const decision = await aj.protect(req); console.log("Decision", decision);
for (const result of decision.results) { console.log("Rule Result", result);
if (result.reason.isSensitiveInfo()) { console.log("Sensitive info rule", result); } }
if (decision.isDenied()) { return res .status(403) .json({ error: "Forbidden", reason: decision.reason }); }
res.status(200).json({ name: "Hello world" });}
import arcjet, { sensitiveInfo } from "@arcjet/remix";import type { ActionFunctionArgs } from "@remix-run/node";
// This function is called by the `sensitiveInfo` rule to perform custom detection on strings.function detectDash(tokens: string[]): Array<"CONTAINS_DASH" | undefined> { return tokens.map((token) => { if (token.includes("-")) { return "CONTAINS_DASH"; } });}
const aj = arcjet({ key: process.env.ARCJET_KEY!, // Get your site key from https://app.arcjet.com rules: [ sensitiveInfo({ deny: ["EMAIL", "CONTAINS_DASH"], mode: "LIVE", detect: detectDash, contextWindowSize: 2, }), ],});
export async function action(args: ActionFunctionArgs) { const decision = await aj.protect(args);
if (decision.isDenied()) { if (decision.reason.isSensitiveInfo()) { return Response.json( { error: "Please don't send personal data." }, { status: 400 }, ); } else { return Response.json({ error: "Forbidden" }, { status: 403 }); } }
// We don't need to use the decision elsewhere, but you could return it to // the component return null;}
import arcjet, { sensitiveInfo } from "@arcjet/remix";
// This function is called by the `sensitiveInfo` rule to perform custom detection on strings.function detectDash(tokens) { return tokens.map((token) => { if (token.includes("-")) { return "CONTAINS_DASH"; } });}
const aj = arcjet({ key: process.env.ARCJET_KEY, // Get your site key from https://app.arcjet.com rules: [ sensitiveInfo({ deny: ["EMAIL", "CONTAINS_DASH"], mode: "LIVE", detect: detectDash, contextWindowSize: 2, }), ],});
export async function action(args) { const decision = await aj.protect(args);
if (decision.isDenied()) { if (decision.reason.isSensitiveInfo()) { return Response.json( { error: "Please don't send personal data." }, { status: 400 }, ); } else { return Response.json({ error: "Forbidden" }, { status: 403 }); } }
// We don't need to use the decision elsewhere, but you could return it to // the component return null;}
import { env } from "$env/dynamic/private";import arcjet, { sensitiveInfo } from "@arcjet/sveltekit";import { error, json, type RequestEvent } from "@sveltejs/kit";
// This function is called by the `sensitiveInfo` rule to perform custom detection on strings.function detectDash(tokens: string[]): Array<"CONTAINS_DASH" | undefined> { return tokens.map((token) => { if (token.includes("-")) { return "CONTAINS_DASH"; } });}
const aj = arcjet({ key: env.ARCJET_KEY!, // Get your site key from https://app.arcjet.com rules: [ sensitiveInfo({ deny: ["EMAIL", "CONTAINS_DASH"], mode: "LIVE", detect: detectDash, contextWindowSize: 2, }), ],});
export async function GET(event: RequestEvent) { const decision = await aj.protect(event);
for (const result of decision.results) { console.log("Rule Result", result);
if (result.reason.isSensitiveInfo()) { console.log("Sensitive info rule", result); } }
if (decision.isDenied()) { return error(403, "Forbidden"); }
return json({ message: "Hello world" });}
import arcjet, { sensitiveInfo } from "@arcjet/sveltekit";import { error, json } from "@sveltejs/kit";
// This function is called by the `sensitiveInfo` rule to perform custom detection on strings.function detectDash(tokens) { return tokens.map((token) => { if (token.includes("-")) { return "CONTAINS_DASH"; } });}
const aj = arcjet({ key: process.env.ARCJET_KEY, // Get your site key from https://app.arcjet.com rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", detect: detectDash, contextWindowSize: 2, }), ],});
export async function GET(event) { const decision = await aj.protect(event);
for (const result of decision.results) { console.log("Rule Result", result);
if (result.reason.isSensitiveInfo()) { console.log("Sensitive info rule", result); } }
if (decision.isDenied()) { return error(403, "Forbidden"); }
return json({ message: "Hello world" });}
import { ARCJET, type ArcjetNest, sensitiveInfo } from "@arcjet/nest";import { Body, Controller, HttpException, HttpStatus, Inject, Injectable, Logger, Post, Req,} from "@nestjs/common";import type { Request } from "express";
// This would normally go in your service file e.g.// src/page/page.service.ts@Injectable()export class PageService { message(content: string): { message: string; submittedContent: string } { return { message: "Hello world", submittedContent: content, }; }}
// This would normally go in your controller file e.g.// src/page/page.controller.ts// This function is called by the`sensitiveInfo` rule to perform custom// detection on strings.function detectDash(tokens: string[]): Array<"CONTAINS_DASH" | undefined> { return tokens.map((token) => { if (token.includes("-")) { return "CONTAINS_DASH"; } });}
@Controller("page")// Sets up the Arcjet protection without using a guard so we can access the// decision and use it in the controller.export class PageController { // Make use of the NestJS logger: https://docs.nestjs.com/techniques/logger // See // https://github.com/arcjet/example-nestjs/blob/ec742e58c8da52d0a399327182c79e3f4edc8f3b/src/app.module.ts#L29 // and https://github.com/arcjet/example-nestjs/blob/main/src/arcjet-logger.ts // for an example of how to connect Arcjet to the NestJS logger private readonly logger = new Logger(PageController.name);
constructor( private readonly pageService: PageService, @Inject(ARCJET) private readonly arcjet: ArcjetNest, ) {}
@Post() async index(@Req() req: Request, @Body() body: string) { const decision = await this.arcjet .withRule( // This allows all sensitive entities other than email addresses sensitiveInfo({ mode: "LIVE", // Will block requests, use "DRY_RUN" to log only // allow: ["EMAIL"], Will block all sensitive information types other than email. deny: ["EMAIL", "CONTAINS_DASH"], // Will block email addresses and strings containing a dash detect: detectDash, contextWindowSize: 2, }), ) .protect(req);
this.logger.log(`Arcjet: id = ${decision.id}`); this.logger.log(`Arcjet: decision = ${decision.conclusion}`);
if (decision.isDenied()) { if (decision.reason.isSensitiveInfo()) { throw new HttpException( "Unexpected sensitive info detected", HttpStatus.BAD_REQUEST, ); } else { throw new HttpException("Forbidden", HttpStatus.FORBIDDEN); } }
return this.pageService.message(body); }}
import arcjet, { sensitiveInfo } from "@arcjet/node";import http from "node:http";
// This function is called by the `sensitiveInfo` rule to perform custom detection on strings.function detectDash(tokens) { return tokens.map((token) => { if (token.includes("-")) { return "CONTAINS_DASH"; } });}
const aj = arcjet({ key: process.env.ARCJET_KEY, // Get your site key from https://app.arcjet.com rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", detect: detectDash, contextWindowSize: 2, }), ],});
const server = http.createServer(async function (req, res) { const decision = await aj.protect(req);
for (const result of decision.results) { console.log("Rule Result", result);
if (result.reason.isRateLimit()) { console.log("Rate limit rule", result); } }
if (decision.isDenied()) { if (decision.reason.isSensitiveInfo()) { res.writeHead(400, { "Content-Type": "application/json" }); res.end( JSON.stringify({ error: "Unexpected sensitive info detected", reason: decision.reason, }), ); res.end(JSON.stringify({ error: "Forbidden" })); } else { res.writeHead(403, { "Content-Type": "application/json" }); res.end(JSON.stringify({ error: "Forbidden" })); } } else { res.writeHead(200, { "Content-Type": "application/json" }); res.end(JSON.stringify({ message: "Hello world" })); }});
server.listen(8000);
import arcjet, { sensitiveInfo } from "@arcjet/node";import http from "node:http";
// This function is called by the `sensitiveInfo` rule to perform custom detection on strings.function detectDash(tokens: string[]): Array<"CONTAINS_DASH" | undefined> { return tokens.map((token) => { if (token.includes("-")) { return "CONTAINS_DASH"; } });}
const aj = arcjet({ key: process.env.ARCJET_KEY!, // Get your site key from https://app.arcjet.com rules: [ sensitiveInfo({ deny: ["EMAIL", "CONTAINS_DASH"], mode: "LIVE", detect: detectDash, contextWindowSize: 2, }), ],});
const server = http.createServer(async function ( req: http.IncomingMessage, res: http.ServerResponse,) { const decision = await aj.protect(req);
for (const result of decision.results) { console.log("Rule Result", result);
if (result.reason.isRateLimit()) { console.log("Rate limit rule", result); } }
if (decision.isDenied()) { if (decision.reason.isSensitiveInfo()) { res.writeHead(400, { "Content-Type": "application/json" }); res.end( JSON.stringify({ error: "Unexpected sensitive info detected", reason: decision.reason, }), ); res.end(JSON.stringify({ error: "Forbidden" })); } else { res.writeHead(403, { "Content-Type": "application/json" }); res.end(JSON.stringify({ error: "Forbidden" })); } } else { res.writeHead(200, { "Content-Type": "application/json" }); res.end(JSON.stringify({ message: "Hello world" })); }});
server.listen(8000);
Accessing the body
The Arcjet Sensitive Info rule accesses the request body, so if you also need to
access the body in your application code, you should parse it before calling
protect
. Otherwise, you may see an error Body already read
.
For example, using Express:
import arcjet, { sensitiveInfo } from "@arcjet/node";import express from "express";
const app = express();const port = 3000;
const aj = arcjet({ key: process.env.ARCJET_KEY!, rules: [ sensitiveInfo({ mode: "LIVE", deny: ["EMAIL"], }), ],});
// Body is accessed here first so it can be used in the protect method and// referenced later.app.use(express.text());
app.post("/", async (req, res) => { const decision = await aj.protect(req);
if (decision.isDenied() && decision.reason.isSensitiveInfo()) { res.writeHead(400, { "Content-Type": "application/json" }); res.end( JSON.stringify({ error: "Sensitive Information Detected", denied: decision.reason.denied, }), ); } else { res.writeHead(200, { "Content-Type": "application/json" }); // We can safely access the body here because it has already been referenced res.end(JSON.stringify({ message: `You said: ${req.body}` })); }});
app.listen(port, () => { console.log(`Example app listening on port ${port}`);});
import arcjet, { sensitiveInfo } from "@arcjet/node";import express from "express";
const app = express();const port = 3000;
const aj = arcjet({ key: process.env.ARCJET_KEY, rules: [ sensitiveInfo({ mode: "LIVE", deny: ["EMAIL"], }), ],});
// Body is accessed here first so it can be used in the protect method and// referenced later.app.use(express.text());
app.post("/", async (req, res) => { const decision = await aj.protect(req);
if (decision.isDenied() && decision.reason.isSensitiveInfo()) { res.writeHead(400, { "Content-Type": "application/json" }); res.end( JSON.stringify({ error: "Sensitive Information Detected", denied: decision.reason.denied, }), ); } else { res.writeHead(200, { "Content-Type": "application/json" }); // We can safely access the body here because it has already been referenced res.end(JSON.stringify({ message: `You said: ${req.body}` })); }});
app.listen(port, () => { console.log(`Example app listening on port ${port}`);});
Error handling
Arcjet is designed to fail open so that a service issue or misconfiguration does
not block all requests. The SDK will also time out and fail open after 500ms
when NODE_ENV
is production
and 1000ms otherwise. However, in most cases,
the response time will be less than 20-30ms.
If there is an error condition when processing the rule, Arcjet will return an
ERROR
result for that rule and you can check the message
property on the rule’s
error result for more information.
If all other rules that were run returned an ALLOW
result, then the final Arcjet
conclusion will be ERROR
.
import arcjet, { sensitiveInfo } from "@arcjet/bun";import { env } from "bun";
const aj = arcjet({ key: env.ARCJET_KEY!, // Get your site key from https://app.arcjet.com rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), ],});
export default { port: 3000, fetch: aj.handler(async (req) => { const decision = await aj.protect(req);
for (const { reason } of decision.results) { if (reason.isError()) { // Fail open by logging the error and continuing console.warn("Arcjet error", reason.message); // You could also fail closed here for very sensitive routes //return new Response("Service unavailable", { status: 503 }); } }
if (decision.isDenied()) { return new Response( "Your request contained unexpected sensitive information!", { status: 400 }, ); }
return new Response("Hello world"); }),};
import arcjet, { sensitiveInfo } from "@arcjet/bun";import { env } from "bun";
const aj = arcjet({ key: env.ARCJET_KEY, // Get your site key from https://app.arcjet.com rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), ],});
export default { port: 3000, fetch: aj.handler(async (req) => { const decision = await aj.protect(req);
for (const { reason } of decision.results) { if (reason.isError()) { // Fail open by logging the error and continuing console.warn("Arcjet error", reason.message); // You could also fail closed here for very sensitive routes //return new Response("Service unavailable", { status: 503 }); } }
if (decision.isDenied()) { return new Response( "Your request contained unexpected sensitive information!", { status: 400 }, ); }
return new Response("Hello world"); }),};
import { env } from "$env/dynamic/private";import arcjet, { sensitiveInfo } from "@arcjet/sveltekit";import { error, json, type RequestEvent } from "@sveltejs/kit";
const aj = arcjet({ key: env.ARCJET_KEY!, rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), ],});
export async function GET(event: RequestEvent) { const decision = await aj.protect(event);
for (const { reason } of decision.results) { if (reason.isError()) { // Fail open by logging the error and continuing console.warn("Arcjet error", reason.message); // You could also fail closed here for very sensitive routes //return error(503, { message: "Service unavailable" }); } }
if (decision.isDenied()) { return error(403, { message: "You are suspicious!" }); }
return json({ message: "Hello world" });}
import { env } from "$env/dynamic/private";import arcjet, { sensitiveInfo } from "@arcjet/sveltekit";import { error, json } from "@sveltejs/kit";
const aj = arcjet({ key: env.ARCJET_KEY, rules: [ sensitiveInfo({ deny: ["EMAIL"], mode: "LIVE", }), ],});
export async function GET(event) { const decision = await aj.protect(event);
for (const { reason } of decision.results) { if (reason.isError()) { // Fail open by logging the error and continuing console.warn("Arcjet error", reason.message); // You could also fail closed here for very sensitive routes //return error(503, { message: "Service unavailable" }); } }
if (decision.isDenied()) { return error(403, { message: "You are suspicious!" }); }
return json({ message: "Hello world"