Skip to content

SvelteKit sensitive info reference

Arcjet Sensitive Information Detection protects against clients sending you sensitive information such as PII that you do not wish to handle.

Configuration

Sensitive Info is configured by specifying which mode you want it to run in.

The configuration definition is:

type SensitiveInfoOptions = {
mode?: "LIVE" | "DRY_RUN";
allow?: Array<SensitiveInfoType>; // Cannot be specified if `deny` is present
deny?: Array<SensitiveInfoType>;// Cannot be specified if `allow` is present
contextWindowSize?: number;
detect?: (tokens: string[]) -> Array<SensitiveInfoType | undefined>;
};

The arcjet client is configured with one or more sensitiveInfo rules which take one or many SensitiveInfoOptions.

Per route

This configures sensitive info on a single route.

/src/routes/+page.server.ts
import { env } from "$env/dynamic/private";
import arcjet, { sensitiveInfo } from "@arcjet/sveltekit";
import { error, type RequestEvent } from "@sveltejs/kit";
const aj = arcjet({
key: env.ARCJET_KEY!, // Get your site key from https://app.arcjet.com
rules: [
sensitiveInfo({
deny: ["EMAIL"],
mode: "LIVE",
}),
],
});
export async function load(event: RequestEvent) {
const decision = await aj.protect(event);
if (decision.isDenied()) {
return error(403, "You are suspicious!");
}
return {};
}

Hooks

This will run on every request to your SvelteKit app - see the SvelteKit Hooks docs for details.

Create a file called hooks.server.ts in your project (inside src):

/src/hooks.server.ts
import { env } from "$env/dynamic/private";
import arcjet, { sensitiveInfo } from "@arcjet/sveltekit";
import { error, type RequestEvent } from "@sveltejs/kit";
const aj = arcjet({
key: env.ARCJET_KEY!, // Get your site key from https://app.arcjet.com
rules: [
// This allows all sensitive entities other than email addresses and those containing a dash character.
sensitiveInfo({
mode: "LIVE", // Will block requests, use "DRY_RUN" to log only
// allow: ["EMAIL"], Will block all sensitive information types other than email.
deny: ["EMAIL"], // Will block email addresses
}),
],
});
export async function handle({
event,
resolve,
}: {
event: RequestEvent;
resolve: (event: RequestEvent) => Response | Promise<Response>;
}): Promise<Response> {
const decision = await aj.protect(event);
if (decision.isDenied()) {
return error(400, "Forbidden");
}
return resolve(event);
}

Avoiding double protection with hooks

If you use Arcjet in hooks and individual routes, you need to be careful that Arcjet is not running multiple times per request. This can be avoided by excluding the individual routes before running Arcjet in the hook.

For example, if you already have a sensitive info rule defined in the API route at /api/arcjet, you can exclude it from the hook like this:

/src/hooks.server.ts
import { env } from "$env/dynamic/private";
import arcjet, { sensitiveInfo } from "@arcjet/sveltekit";
import { error, type RequestEvent } from "@sveltejs/kit";
const aj = arcjet({
key: env.ARCJET_KEY!, // Get your site key from https://app.arcjet.com
rules: [
sensitiveInfo({
deny: ["EMAIL"],
mode: "LIVE",
}),
],
});
export async function handle({
event,
resolve,
}: {
event: RequestEvent;
resolve: (event: RequestEvent) => Response | Promise<Response>;
}): Promise<Response> {
// Ignore routes that extend the Arcjet rules
// - they will call `.protect` themselves
const filteredRoutes = ["/api/arcjet"];
if (filteredRoutes.includes(event.url.pathname)) {
// return - route will handle protection
return resolve(event);
}
// Ensure every other route is protected with shield
const decision = await aj.protect(event);
if (decision.isDenied()) {
return error(403, "Forbidden");
}
// Continue with the route
return resolve(event);
}

Decision

The quick start example will deny requests that are determined to be suspicious, immediately returning a response to the client using SvelteKit’s server hook.

Arcjet also provides a single protect function that is used to execute your protection rules. This requires a RequestEvent property which is the event context as passed to the request handler.

This function returns a Promise that resolves to an ArcjetDecision object. This contains the following properties:

  • id (string) - The unique ID for the request. This can be used to look up the request in the Arcjet dashboard. It is prefixed with req_ for decisions involving the Arcjet cloud API. For decisions taken locally, the prefix is lreq_.
  • conclusion (ArcjetConclusion) - The final conclusion based on evaluating each of the configured rules. If you wish to accept Arcjet’s recommended action based on the configured rules then you can use this property.
  • reason (ArcjetReason) - An object containing more detailed information about the conclusion.
  • results (ArcjetRuleResult[]) - An array of ArcjetRuleResult objects containing the results of each rule that was executed.
  • ip (ArcjetIpDetails) - An object containing Arcjet’s analysis of the client IP address. See IP analysis in the SDK reference for more information.

See the SDK reference for more details about the rule results.

You check if a deny conclusion has been returned by a sensitive info rule by using decision.isDenied() and decision.reason.isSensitiveInfo() respectively.

You can iterate through the results and check whether a sensitive info rule was applied:

for (const result of decision.results) {
console.log("Rule Result", result);
}

This example will log the full result as well as the sensitive info rule:

Create a new API route at /src/routes/api/arcjet/+server.ts:

/src/routes/api/arcjet/+server.ts
import { env } from "$env/dynamic/private";
import arcjet, { sensitiveInfo } from "@arcjet/sveltekit";
import { error, json, type RequestEvent } from "@sveltejs/kit";
const aj = arcjet({
key: env.ARCJET_KEY!,
rules: [
sensitiveInfo({
deny: ["EMAIL"],
mode: "LIVE",
}),
],
});
export async function GET(event: RequestEvent) {
const decision = await aj.protect(event);
for (const result of decision.results) {
console.log("Rule Result", result);
if (result.reason.isSensitiveInfo()) {
console.log("Sensitive info rule", result);
}
}
if (decision.isDenied()) {
return error(403, "Forbidden");
}
return json({ message: "Hello world" });
}

Custom entity detection

When configuring Arcjet Sensitive Info you can provide a custom detect function, this enables you to detect entities that we don’t support out of the box using custom logic.

The function will take a list of tokens and must return a list of either undefined, if the corresponding token in the input list is not sensitive, or the name of the entity if it does match. The number of tokens that are provided to the function is controlled by the contextWindowSize option, which defaults to 1. If you need additional context to perform detections then you can increase this value.

import { env } from "$env/dynamic/private";
import arcjet, { sensitiveInfo } from "@arcjet/sveltekit";
import { error, json, type RequestEvent } from "@sveltejs/kit";
// This function is called by the `sensitiveInfo` rule to perform custom detection on strings.
function detectDash(tokens: string[]): Array<"CONTAINS_DASH" | undefined> {
return tokens.map((token) => {
if (token.includes("-")) {
return "CONTAINS_DASH";
}
});
}
const aj = arcjet({
key: env.ARCJET_KEY!, // Get your site key from https://app.arcjet.com
rules: [
sensitiveInfo({
deny: ["EMAIL", "CONTAINS_DASH"],
mode: "LIVE",
detect: detectDash,
contextWindowSize: 2,
}),
],
});
export async function GET(event: RequestEvent) {
const decision = await aj.protect(event);
for (const result of decision.results) {
console.log("Rule Result", result);
if (result.reason.isSensitiveInfo()) {
console.log("Sensitive info rule", result);
}
}
if (decision.isDenied()) {
return error(403, "Forbidden");
}
return json({ message: "Hello world" });
}

Error handling

Arcjet is designed to fail open so that a service issue or misconfiguration does not block all requests. The SDK will also time out and fail open after 500ms when NODE_ENV is production and 1000ms otherwise. However, in most cases, the response time will be less than 20-30ms.

If there is an error condition, Arcjet will return an ERROR type and you can check the reason property for more information, like accessing decision.reason.message.

/src/routes/api/arcjet/+server.ts
import { env } from "$env/dynamic/private";
import arcjet, { sensitiveInfo } from "@arcjet/sveltekit";
import { error, json, type RequestEvent } from "@sveltejs/kit";
const aj = arcjet({
key: env.ARCJET_KEY!,
rules: [
sensitiveInfo({
deny: ["EMAIL"],
mode: "LIVE",
}),
],
});
export async function GET(event: RequestEvent) {
const decision = await aj.protect(event);
if (decision.isErrored()) {
// Fail open by logging the error and continuing
console.warn("Arcjet error", decision.reason.message);
// You could also fail closed here for very sensitive routes
//return error(503, { message: "Service unavailable" });
}
if (decision.isDenied()) {
return error(403, { message: "You are suspicious!" });
}
return json({ message: "Hello world" });
}

Testing

Arcjet runs the same in any environment, including locally and in CI. You can use the mode set to DRY_RUN to log the results of rule execution without blocking any requests.

We have an example test framework you can use to automatically test your rules. Arcjet can also be triggered based using a sample of your traffic.

See the Testing section of the docs for details.

Discussion