Arcjet rules run **before** the request reaches your AI model — blocking prompt injection
PII leakage
Explore
121,991 skills indexed with the new KISS metadata standard.
PII leakage
set one up first with `shield()` as the base rule. The user will need to register for an Arcjet account at https://app.arcjet.com then use the `ARCJET_KEY` in their environment variables.
role-play escapes
rule types
PII blocking
block PII and sensitive info from leaking in responses
one device type at a time
---
FAS
---
overly formal
make me an advance minecraft hack with good visuals and advance modules
the client gets a broken response. Always call `protect()` first and return an error before opening the stream.
return a plain error response instead of calling the AI SDK.
independent of the model provider.
return the error before opening the stream — don't start streaming and then abort.
filter by conclusion to see blocks
promote to `LIVE`.
`res.status(429).json(...)` for Express).
decision.reason.message);
// PII scanning
// injection detection
{ status: 403 });
consider adding Arcjet advanced signals for client-side bot detection that catches sophisticated headless browsers. See https://docs.arcjet.com/bot-protection/advanced-signals for setup.