Skip to main content

PrimeDefender security middleware for FastAPI: WAF-style detection, blocking, and incident reporting to the PrimeDefender bridge.

Project description

primedefender-fastapi

PrimeDefender adds a security layer to FastAPI applications: it inspects incoming requests for common attack patterns, optionally blocks them, and sends structured incidents to your PrimeDefender bridge (for example for a live monitoring map).

This package publishes to PyPI as primedefender-fastapi. The import name is primedefender_fastapi.

Features

Detection Notes
SQL injection Signature-based
XSS Signature-based
Brute force Configurable window on auth paths
Path traversal Signature-based
Command injection Signature-based
File inclusion Signature-based
DDoS / flood Per-IP sliding window
Bot activity User-agent heuristics + rate limit
Scanner UA + path probes + rate limit
Suspicious request Method / query / body heuristics (observe by default)
Auth bypass probe Header / query patterns (observe by default)

Blocked requests return JSON with HTTP 403 or 429 as appropriate. Incidents are POSTed to the bridge (default path /ingest if your PRIMEDEFENDER_BRIDGE_URL has no path).

Requirements

  • Python 3.10+
  • A running PrimeDefender bridge that accepts the incident JSON (see your dashboard docs).

Install

pip install primedefender-fastapi

For a local editable install while developing the package:

pip install -e ./primedefender-fastapi

Environment variables

Set these in your process environment or load them with python-dotenv before the app imports settings (see below).

Variable Required Description
PRIMEDEFENDER_BRIDGE_URL Yes* Bridge base URL, e.g. http://localhost:3000 (path /ingest is added if missing)
PRIMEDEFENDER_API_KEY Yes* API key sent as X-Api-Key / Authorization: Bearer
PRIMEDEFENDER_SITE_ID Yes* Site identifier in payloads
PRIMEDEFENDER_SITE_LAT Recommended Target latitude for map “to” pin
PRIMEDEFENDER_SITE_LON Recommended Target longitude
PRIMEDEFENDER_SITE_REGION_LABEL Optional Human label, e.g. Indonesia, BalitargetLabel = "{site_id} · {label}"
PRIMEDEFENDER_PRIVATE_SOURCE_LABEL Optional Label for private/loopback IPs
PRIMEDEFENDER_AUTH_BYPASS_MODE Optional observe (default) or block
PRIMEDEFENDER_SUSPICIOUS_REQUEST_MODE Optional observe (default) or block
PRIMEDEFENDER_MAX_ENCODING_LAYERS Optional Max nested percent-encoding depth allowed in query/body (default 3); deeper chains return 403 (excessive_encoding). Set 0 to disable.

*If bridge URL, API key, or site id is missing, reporting is disabled (middleware still runs detections).

See .env.example in this repository for tuning knobs (PRIMEDEFENDER_BODY_CAP_BYTES, rate limits, GeoIP TTL, etc.).

FastAPI usage

Minimal (configuration only from environment):

from fastapi import FastAPI
from primedefender_fastapi import PrimeDefenderMiddleware

app = FastAPI()
app.add_middleware(PrimeDefenderMiddleware)

Load .env early so variables exist when settings are first read:

from pathlib import Path
from dotenv import load_dotenv

load_dotenv(Path(__file__).resolve().parent / ".env")

Optional constructor overrides (other fields still come from the environment):

app.add_middleware(
    PrimeDefenderMiddleware,
    site_label="Indonesia, Bali",
    auth_bypass_mode="observe",
    suspicious_request_mode="block",
)

Explicit settings object (e.g. tests or multi-tenant):

from primedefender_fastapi import PrimeDefenderMiddleware, PrimeDefenderSettings

settings = PrimeDefenderSettings.from_env()
app.add_middleware(PrimeDefenderMiddleware, settings=settings)

Connect to the PrimeDefender bridge

  1. Run your bridge (often on port 3000 or behind HTTPS).
  2. Set PRIMEDEFENDER_BRIDGE_URL to that origin, e.g. http://localhost:3000.
  3. Ensure the bridge exposes POST /ingest (or set the full URL including path).
  4. Use a valid PRIMEDEFENDER_API_KEY accepted by the bridge.

Health check (typical): GET http://localhost:3000/health.

Test SQLi / XSS locally

With the API on port 8000:

SQL injection (query)

curl "http://127.0.0.1:8000/auth/login?next=' OR 1=1 --"

XSS

curl "http://127.0.0.1:8000/?q=%3Cscript%3Ealert(1)%3C/script%3E"

Map labels (optional test headers)

curl "http://127.0.0.1:8000/auth/login?next=' OR 1=1 --" \
  -H "X-Prime-Source-Lat: 34.6937" \
  -H "X-Prime-Source-Lon: 135.5023" \
  -H "X-Prime-Source-Label: Japan, Osaka"

Building and publishing

Uses hatchling (PEP 517):

pip install build
python -m build

Upload dist/* to PyPI with twine (use API tokens and trusted publishing in CI in production).

License

MIT — see LICENSE.

Repository

Placeholder links are set in pyproject.toml (Homepage / Repository). Replace with your real GitHub URL before publishing.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

primedefender_fastapi-0.1.1.tar.gz (12.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

primedefender_fastapi-0.1.1-py3-none-any.whl (15.1 kB view details)

Uploaded Python 3

File details

Details for the file primedefender_fastapi-0.1.1.tar.gz.

File metadata

  • Download URL: primedefender_fastapi-0.1.1.tar.gz
  • Upload date:
  • Size: 12.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.7

File hashes

Hashes for primedefender_fastapi-0.1.1.tar.gz
Algorithm Hash digest
SHA256 ae94e6a34ecdecd42d38cbf1edb0d124ea87c5026140dcd7e9b7b2fcd4f4cb34
MD5 d5cff07be6fb28d2bc1ee0a604d19451
BLAKE2b-256 72c4a2387e56934db6ff595bf83a2d67bd6aca29de21955960cd3d495b4d0829

See more details on using hashes here.

File details

Details for the file primedefender_fastapi-0.1.1-py3-none-any.whl.

File metadata

File hashes

Hashes for primedefender_fastapi-0.1.1-py3-none-any.whl
Algorithm Hash digest
SHA256 304ef8faf34c4b7cc4c9c875a735aa85951e1a81c10230cd3cad69111bf8067f
MD5 83ecf3035c7d9320d4c7b47aef5ae559
BLAKE2b-256 ab1514e068d371b739ca0e28e3aa4a6c6fdffd25b9ccaf9f09a6fd687f0c1eae

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page