Arcjet
banner
arcjet.com
Arcjet
@arcjet.com
The security platform that ships with your code. Bot detection. Rate limiting. Email validation. Attack protection. Data redaction. A developer-first approach to security.
Reposted by Arcjet
It has all these features:
- Auth management by @clerk.com
- payments by Stripe
- database by @prisma.io
- security by @arcjet.com
- emails
- api app
- web app for landing page
- app for the main app
- docs app for documentation
- and so much more!
November 26, 2024 at 6:30 PM
We're still using Rust to compile to Wasm of course because we don't want to bundle the Go runtime with the GC.

Picking the best tool for the job 💪

More details: blog.arcjet.com/rethinking-o...
Rethinking our REST API: Building the Golden API
Using Go + Gin to reimplement our backend REST API. How we built the golden API: performance & scalability, comprehensive docs, security, authentication, and testability.
blog.arcjet.com
November 19, 2024 at 2:08 PM
Creating an email parser requires combining local part parsing with domain parsing to ensure we validate the syntax against the RFCs...but of course just following the RFC doesn't quite work in the real world!
November 15, 2024 at 10:56 AM
Its design focuses on zero-copy parsing (memory-efficient data interpretation without allocations), using Rust's streaming capabilities, and bit-level parsing support. This makes it highly efficient and versatile.
November 15, 2024 at 10:56 AM
Mitigating these GraphQL attacks requires multiple levels of defense in depth:

Disable Schema Enumeration Features
Implement a Timeout
Limit Query Complexity
November 12, 2024 at 9:46 AM
Cross-Site Scripting (XSS), Structured Query Language Injection (SQLi), Server-Side Request Forgery (SSRF), and Command Injection.
November 12, 2024 at 9:46 AM
This is all due to how GraphQL queries cascade through multiple levels of depth.

And of course as with any other user input, queries and mutations can be vulnerable to injection attacks...
November 12, 2024 at 9:46 AM