If the user wants a full security review
suggest the `/arcjet:security-analyst` agent which can investigate traffic
Explore
120,374 skills indexed with the new KISS metadata standard.
suggest the `/arcjet:security-analyst` agent which can investigate traffic
`res.status(429).json(...)` for Express).
filter by conclusion to see blocks
decision.reason.message);
{ status: 403 });
// injection detection
// PII scanning
// tokens to deduct for rate limiting
{
defaults to IP-based.
consider adding Arcjet advanced signals for client-side bot detection that catches sophisticated headless browsers. See https://docs.arcjet.com/bot-protection/advanced-signals for setup.
deduct 1 token per message
directly linking rate limiting to cost. It also allows short bursts while enforcing an average rate
SensitiveInfoType.CREDIT_CARD_NUMBER
role-play escapes
set one up first with `shield()` as the base rule. The user will need to register for an Arcjet account at https://app.arcjet.com then use the `ARCJET_KEY` in their environment variables.
PII leakage
rule types
block PII and sensitive info from leaking in responses
PII blocking
one device type at a time
---
FAS
---