Arcjet helps developers protect their apps in just a few lines of
code. Implement rate limiting, bot protection, email verification, and defense
against common attacks.
This is our adapter to integrate Arcjet into Bun.
Arcjet helps you secure your Bun server.
This package exists so that we can provide the best possible experience to
Bun users.
When should I use this?
You can use this if you are using Bun.
See our Get started guide for other supported
runtimes.
Install
This package is ESM only.
Install with Bun:
bun add @arcjet/bun
Use
import arcjet, { shield } from"@arcjet/bun";
// Get your Arcjet key at <https://app.arcjet.com>.// Set it as an environment variable instead of hard coding it.const arcjetKey = Bun.env.ARCJET_KEY;
if (!arcjetKey) {
thrownewError("Cannot find `ARCJET_KEY` environment variable");
}
const aj = arcjet({
key: arcjetKey,
rules: [
// Shield protects your app from common attacks.// Use `DRY_RUN` instead of `LIVE` to only log.shield({ mode: "LIVE" }),
],
});
exportdefault {
port: 8000,
fetch: aj.handler(asyncfunction (request: Request) {
const decision = await aj.protect(request);
if (decision.isDenied()) {
returnResponse.json({ message: "Forbidden" }, { status: 403 });
}
returnResponse.json({ message: "Hello world" });
}),
};
For more on how to configure Arcjet with Bun and how to protect Bun,
see the Arcjet Bun SDK reference on our website.
The npm package @arcjet/bun receives a total of 205 weekly downloads. As such, @arcjet/bun popularity was classified as not popular.
We found that @arcjet/bun demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago.It has 3 open source maintainers collaborating on the project.
Package last updated on 05 Aug 2025
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
The Socket Threat Research Team uncovered a coordinated campaign that floods the Chrome Web Store with 131 rebranded clones of a WhatsApp Web automation extension to spam Brazilian users.