Skip to main content

Plug & play security library for FastAPI — rate limiting, honeypots, JWT, API keys, and more.

Project description

Araxys Logo

Plug & Play Security for FastAPI
Rate limiting · Honeypots · JWT · API Keys · Encrypted Audit Logging

Python FastAPI Pydantic uv License

AES-256-GCM JWT Redis structlog Tests


⚡ What is Araxys?

Araxys is a comprehensive security library for FastAPI that provides enterprise-grade protection with a plug & play architecture. Add security to your API with three lines of code — no rewrites, no boilerplate.

from fastapi import FastAPI
from araxys import AraxysShield, AraxysConfig

app = FastAPI()
shield = AraxysShield(app, AraxysConfig(secret_key="your-32-char-secret-key-here!!!!"))
# That's it. Your API is now protected. 🛡️

🧩 Modules

Module Description Status
🚦 Rate Limiting Dynamic sliding window with escalating bans ✅ Ready
🍯 Honeypots Fake endpoints that auto-ban bots ✅ Ready
🔑 API Keys Scoped keys with SHA-256 hashing & expiration ✅ Ready
🎟️ JWT Auth Access + Refresh tokens with rotation & revocation ✅ Ready
🛡️ Secure Headers HSTS, CSP, X-Frame-Options & more (OWASP) ✅ Ready
🧹 Sanitization SQLi detection & XSS stripping ✅ Ready
📋 Audit Logging AES-256-GCM encrypted structured logs ✅ Ready

📦 Installation

# Core (in-memory backends)
pip install araxys

# With Redis support (recommended for production)
pip install araxys[redis]

# Development
pip install araxys[dev]

Requires Python 3.13+


[!TIP] AI Agent Support: This repository includes an AI.md file specifically designed to provide high-density context for AI coding assistants (Cursor, Windsurf, etc.), ensuring they follow project standards and understand the internal architecture.


🚀 Quick Start

Full Protection (All Modules)

from fastapi import FastAPI
from araxys import AraxysShield, AraxysConfig

app = FastAPI()

shield = AraxysShield(
    app,
    AraxysConfig(
        secret_key="super-secret-key-at-least-32-chars!",
        redis_url="redis://localhost:6379",  # Optional — omit for in-memory
        rate_limit={"window_seconds": 60, "max_requests": 100},
        honeypot={"paths": ["/admin/config", "/wp-admin", "/.env"]},
        secure_headers={"enabled": True},
        sanitize={"enabled": True},
        audit={"encrypt": True, "log_file": "audit.log"},
    ),
)

API Key Authentication

from fastapi import Depends
from araxys import Scope
from araxys.api_keys.dependencies import require_api_key
from araxys.api_keys.models import APIKeyRecord

# Create a key
key = await shield.api_key_manager.create_key(
    owner="service-a",
    scopes=[Scope.READ, Scope.WRITE],
    ttl_days=90,
)
print(f"Save this key: {key.raw_key}")  # Shown only once!

### 💻 Command Line Interface (CLI)

Araxys includes a professional CLI for managing API keys and security assets directly from your terminal.

**Setup:**

```bash
# Install with CLI dependencies
pip install "araxys[cli]"

# Configure your storage
export ARAXYS_REDIS_URL="redis://localhost:6379"

Usage:

# Create a new key
araxys keys create --owner "service-a" --scopes "read,write" --ttl 90

# List active keys in a beautiful table
araxys keys list

# Revoke a key by its prefix
araxys keys revoke [prefix]

Protect an endpoint

@app.get("/data") async def get_data( key: APIKeyRecord = Depends( require_api_key(Scope.READ, manager=shield.api_key_manager) ), ): return {"data": "protected", "owner": key.owner}


### JWT with Token Rotation

```python
from fastapi import Depends
from araxys import Scope
from araxys.jwt_auth.dependencies import require_jwt
from araxys.jwt_auth.tokens import TokenPayload

# Login — issue tokens
@app.post("/auth/login")
async def login(username: str, password: str):
    # ... validate credentials ...
    pair = await shield.jwt_manager.create_token_pair(
        subject=user.id,
        scopes=[Scope.READ, Scope.WRITE],
    )
    return pair.model_dump()

# Refresh — rotate tokens (old refresh token is blacklisted)
@app.post("/auth/refresh")
async def refresh(refresh_token: str):
    new_pair = await shield.jwt_manager.rotate_tokens(refresh_token)
    return new_pair.model_dump()

# Protected endpoint
@app.get("/profile")
async def profile(
    user: TokenPayload = Depends(
        require_jwt(Scope.READ, jwt_manager=shield.jwt_manager)
    ),
):
    return {"user_id": user.sub, "scopes": user.scopes}

🏗️ Architecture

src/araxys/
├── core/               # Config, exceptions, shared types
│   ├── config.py       # Pydantic Settings (env var support)
│   ├── exceptions.py   # Custom exception hierarchy
│   └── types.py        # Scope, AuditEntry, SecurityContext
├── rate_limit/         # 🚦 Dynamic rate limiting
│   ├── backends.py     # Protocol + InMemory + Redis
│   ├── limiter.py      # Sliding window + escalation
│   └── middleware.py   # ASGI middleware
├── honeypot/           # 🍯 Trap endpoints
│   ├── trap.py         # Route registration + auto-ban
│   └── middleware.py   # IP ban enforcement
├── api_keys/           # 🔑 API Key management
│   ├── models.py       # Pydantic models
│   ├── manager.py      # CRUD + verification
│   ├── storage.py      # Protocol + InMemory + Redis
│   └── dependencies.py # FastAPI dependencies
├── cli.py              # 💻 Command Line Interface (Typer + Rich)
├── jwt_auth/           # 🎟️ JWT tokens
│   ├── tokens.py       # Create, decode, rotate
│   ├── storage.py      # JTI blacklisting
│   └── dependencies.py # FastAPI dependencies
├── headers/            # 🛡️ Security headers
│   └── middleware.py   # HSTS, CSP, X-Frame-Options
├── sanitize/           # 🧹 Input sanitization
│   ├── patterns.py     # SQLi + XSS regex patterns
│   ├── filters.py      # Detection + stripping
│   └── middleware.py   # ASGI middleware
├── audit/              # 📋 Audit logging
│   ├── encryption.py   # AES-256-GCM + PBKDF2
│   ├── logger.py       # Structured logger
│   └── events.py       # Event types
└── shield.py           # ⚡ Main orchestrator

🔐 Security Features in Detail

Rate Limiting

  • Sliding window counter per IP + endpoint
  • Escalating bans: repeated violations increase ban duration exponentially
  • X-RateLimit headers: Limit, Remaining, Window injected in every response
  • Path exclusion: Skip /docs, /healthz, etc.

Honeypot Endpoints

  • Registers fake routes like /admin/config, /wp-admin, /.env
  • Returns 200 OK with fake content (doesn't alert the bot)
  • Auto-bans the IP across ALL endpoints
  • Integrates with audit logging

API Key Management

  • 256-bit entropy keys via secrets.token_urlsafe
  • Stored as SHA-256 hashes (raw key is never persisted)
  • Scope-based authorization: read, write, admin
  • Expiration support with configurable TTL
  • Pluggable storage: implement the APIKeyStorage protocol with your database

JWT with Token Rotation

  • Access + Refresh token pairs following OAuth2 best practices
  • JTI-based revocation: each refresh token has a unique ID
  • Replay attack detection: reusing a rotated refresh token triggers an alert
  • Configurable TTLs: access (default 30min), refresh (default 7 days)
  • Scope embedding in token claims

Secure Headers

Header Default Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-XSS-Protection 0 (disabled — modern best practice)
Referrer-Policy strict-origin-when-cross-origin
Content-Security-Policy Configurable
Permissions-Policy Configurable

Payload Sanitization

  • 16 SQL injection patterns: UNION, DROP, blind injection, time-based, etc.
  • 9 XSS patterns: script tags, JS URIs, event handlers, iframes
  • Recursive scanning with configurable depth limit
  • SQLi → block (400 response) · XSS → strip (bleach)

Encrypted Audit Logging

  • AES-256-GCM authenticated encryption (confidentiality + integrity)
  • PBKDF2-HMAC-SHA256 key derivation (480,000 iterations — OWASP 2023)
  • Per-entry unique salt + nonce (no two entries share the same key material)
  • Tamper detection: GCM authentication tag catches any modification
  • Structured output via structlog

⚙️ Configuration

All settings support environment variables with the ARAXYS_ prefix:

export ARAXYS_SECRET_KEY="your-production-secret-key-here!"
export ARAXYS_REDIS_URL="redis://localhost:6379"

Or configure programmatically:

from araxys import AraxysConfig, RateLimitConfig, HoneypotConfig

config = AraxysConfig(
    secret_key="...",
    rate_limit=RateLimitConfig(
        max_requests=200,
        window_seconds=120,
        ban_threshold=10,
        ban_duration_seconds=600,
        escalation_multiplier=3.0,
    ),
    honeypot=HoneypotConfig(
        paths=["/admin", "/wp-login.php", "/.git/config"],
        ban_duration_seconds=7200,
    ),
    jwt={"access_token_ttl_minutes": 15, "refresh_token_ttl_days": 30},
    audit={"encrypt": True, "log_file": "/var/log/araxys/audit.log"},
)

🧪 Testing

# Run all tests
uv run pytest tests/ -v

# With coverage
uv run pytest tests/ --cov=araxys --cov-report=term-missing

71 tests covering all 7 modules — rate limiting, honeypots, API keys, JWT, headers, sanitization, and audit logging.


🏭 Production Recommendations

Aspect Recommendation
Backends Use Redis (araxys[redis]) for multi-worker deployments
Secret Key Generate with openssl rand -hex 32 — never hardcode
API Key Storage Implement APIKeyStorage protocol with your database
Audit Logs Enable encryption + write to a dedicated log file
Rate Limits Tune max_requests and ban_threshold per endpoint
HTTPS Always deploy behind TLS — HSTS headers expect it

📁 Tech Stack

Python FastAPI Pydantic JWT Redis structlog cryptography pytest Ruff mypy uv


📄 License

MIT License — see LICENSE for details.


Built with 🛡️ by Samuel Esteban Urrego Valencia
"Security shouldn't be an afterthought — it should be a single import."

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

araxys-0.2.1.tar.gz (29.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

araxys-0.2.1-py3-none-any.whl (41.8 kB view details)

Uploaded Python 3

File details

Details for the file araxys-0.2.1.tar.gz.

File metadata

  • Download URL: araxys-0.2.1.tar.gz
  • Upload date:
  • Size: 29.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for araxys-0.2.1.tar.gz
Algorithm Hash digest
SHA256 3b8c16bd448cc83b7841d234854c3c6571cb05969ee96d4c40a91606c4f8a77d
MD5 20766813bf16e3172cb88cc954d4ea31
BLAKE2b-256 b644e3bc0f1b10c86b7248bb2ca5802ac35540984cbcd346b7120384c18f1e9a

See more details on using hashes here.

Provenance

The following attestation bundles were made for araxys-0.2.1.tar.gz:

Publisher: publish.yml on Samuel-Urrego/Araxys

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file araxys-0.2.1-py3-none-any.whl.

File metadata

  • Download URL: araxys-0.2.1-py3-none-any.whl
  • Upload date:
  • Size: 41.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for araxys-0.2.1-py3-none-any.whl
Algorithm Hash digest
SHA256 f0b90459c58e47ae3a17b3cdc637d3b97914dff1ccc554c05b7114b6a2518319
MD5 c3cca80e28933c351580501b36164247
BLAKE2b-256 ed3c3d80d005d61016b6372b889af7cae6eb2eb19579924159b9cae3276807d9

See more details on using hashes here.

Provenance

The following attestation bundles were made for araxys-0.2.1-py3-none-any.whl:

Publisher: publish.yml on Samuel-Urrego/Araxys

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page