- Sensitive info detection runs **locally in WASM** — no user data is sent to external services. It is only available in route handlers
not in Next.js pages or server actions.
Explore
123,082 skills indexed with the new KISS metadata standard.
not in Next.js pages or server actions.
return a plain error response instead of calling the AI SDK.
independent of the model provider.
filter by conclusion to see blocks
suggest the `/arcjet:security-analyst` agent which can investigate traffic
`res.status(429).json(...)` for Express).
decision.reason.message);
// PII scanning
// injection detection
{ status: 403 });
consider adding Arcjet advanced signals for client-side bot detection that catches sophisticated headless browsers. See https://docs.arcjet.com/bot-protection/advanced-signals for setup.
{
// tokens to deduct for rate limiting
defaults to IP-based.
deduct 1 token per message
directly linking rate limiting to cost. It also allows short bursts while enforcing an average rate
SensitiveInfoType.CREDIT_CARD_NUMBER
role-play escapes
PII leakage
set one up first with `shield()` as the base rule. The user will need to register for an Arcjet account at https://app.arcjet.com then use the `ARCJET_KEY` in their environment variables.
rule types
PII blocking
block PII and sensitive info from leaking in responses
---