- Sensitive info detection runs **locally in WASM** — no user data is sent to external services. It is only available in route handlers
not in Next.js pages or server actions.
Explore
124,955 skills indexed with the new KISS metadata standard.
not in Next.js pages or server actions.
return a plain error response instead of calling the AI SDK.
independent of the model provider.
suggest the `/arcjet:security-analyst` agent which can investigate traffic
`res.status(429).json(...)` for Express).
filter by conclusion to see blocks
decision.reason.message);
{ status: 403 });
// injection detection
// PII scanning
// tokens to deduct for rate limiting
{
defaults to IP-based.
consider adding Arcjet advanced signals for client-side bot detection that catches sophisticated headless browsers. See https://docs.arcjet.com/bot-protection/advanced-signals for setup.
deduct 1 token per message
directly linking rate limiting to cost. It also allows short bursts while enforcing an average rate
SensitiveInfoType.CREDIT_CARD_NUMBER
role-play escapes
set one up first with `shield()` as the base rule. The user will need to register for an Arcjet account at https://app.arcjet.com then use the `ARCJET_KEY` in their environment variables.
PII leakage
rule types
block PII and sensitive info from leaking in responses
PII blocking
one device type at a time