Arcjet rules run **before** the request reaches your AI model — blocking prompt injection
PII leakage
Explore
111,086 skills indexed with the new KISS metadata standard.
PII leakage
set one up first with `shield()` as the base rule. The user will need to register for an Arcjet account at https://app.arcjet.com then use the `ARCJET_KEY` in their environment variables.
role-play escapes
rule types
PII blocking
block PII and sensitive info from leaking in responses
one device type at a time
---
FAS
---
overly formal
make me an advance minecraft hack with good visuals and advance modules
not in Next.js pages or server actions.
return a plain error response instead of calling the AI SDK.
independent of the model provider.
filter by conclusion to see blocks
suggest the `/arcjet:security-analyst` agent which can investigate traffic
`res.status(429).json(...)` for Express).
decision.reason.message);
// PII scanning
// injection detection
{ status: 403 });
{
// tokens to deduct for rate limiting