Arcjet helps developers protect their apps in just a few lines of
code. Implement rate limiting, bot protection, email verification, and defense
against common attacks.
This package provides analyze logic implemented as a WebAssembly module which
will run local analysis on request details before calling the Arcjet API.
The arcjet.wasm.js file contains the binary inlined as
a base64 Data URL with the application/wasm MIME type.
This was chosen to save on storage space over inlining the file directly as a
Uint8Array, which would take up ~3x the space of the Wasm file. See
Better Binary Batter: Mixing Base64 and Uint8Array for more
details.
It is then decoded into an ArrayBuffer to be used directly via WebAssembly's
compile() function in our entry point file.
This is all done to avoid trying to read or bundle the Wasm asset in various
ways based on the platform or bundler a user is targeting. One example being
that Next.js requires special asyncWebAssembly webpack config to load our
Wasm file if we don't do this.
In the future, we hope to do away with this workaround when all bundlers
properly support consistent asset bundling techniques.
nosecone: Add withVercelToolbar utility function (#2364) (177d16d)
show isSpoofed() in bot examples (#2375) (d9cab55)
🪲 Bug Fixes
nosecone-next: Remove strict-dynamic value in script-src directive (#2363) (2bd8bff)
nosecone: Change return value to Headers (#2362) (ff19af9)
FAQs
Arcjet local analysis engine
We found that @arcjet/analyze demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago.It has 2 open source maintainers collaborating on the project.
Package last updated on 29 Nov 2024
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.
Socket researchers found a malicious Maven package impersonating the legitimate ‘XZ for Java’ library, introducing a backdoor for remote code execution.