- Sensitive info detection runs **locally in WASM** — no user data is sent to external services. It is only available in route handlers
not in Next.js pages or server actions.
Explore
113,331 skills indexed with the new KISS metadata standard.
not in Next.js pages or server actions.
return a plain error response instead of calling the AI SDK.
independent of the model provider.
filter by conclusion to see blocks
suggest the `/arcjet:security-analyst` agent which can investigate traffic
`res.status(429).json(...)` for Express).
decision.reason.message);
// PII scanning
// injection detection
{ status: 403 });
{
// tokens to deduct for rate limiting
defaults to IP-based.
deduct 1 token per message
directly linking rate limiting to cost. It also allows short bursts while enforcing an average rate
CREDIT_CARD_NUMBER
role-play escapes
PII leakage
set one up first with `shield()` as the base rule. The user will need to register for an Arcjet account at https://app.arcjet.com then use the `ARCJET_KEY` in their environment variables.
rule types
PII blocking
block PII and sensitive info from leaking in responses
---
one device type at a time