Skip to main content

PrimeDefender security middleware for FastAPI: WAF-style detection, blocking, and incident reporting to the PrimeDefender bridge.

Project description

primedefender-fastapi

PrimeDefender adds a security layer to FastAPI applications: it inspects incoming requests for common attack patterns, optionally blocks them, and sends structured incidents to your PrimeDefender bridge (for example for a live monitoring map).

This package publishes to PyPI as primedefender-fastapi. The import name is primedefender_fastapi.

Features

Detection Notes
SQL injection Signature-based
XSS Signature-based
Brute force Configurable window on auth paths
Path traversal Signature-based
Command injection Signature-based
File inclusion Signature-based
DDoS / flood Per-IP sliding window
Bot activity User-agent heuristics + rate limit
Scanner UA + path probes + rate limit
Suspicious request Method / query / body heuristics (observe by default)
Auth bypass probe Header / query patterns (observe by default)

Blocked requests return JSON with HTTP 403 or 429 as appropriate. Incidents are POSTed to the bridge (default path /ingest if your PRIMEDEFENDER_BRIDGE_URL has no path).

Requirements

  • Python 3.10+
  • A running PrimeDefender bridge that accepts the incident JSON (see your dashboard docs).

Install

pip install primedefender-fastapi

For a local editable install while developing the package:

pip install -e ./primedefender-fastapi

Environment variables

Set these in your process environment or load them with python-dotenv before the app imports settings (see below).

Variable Required Description
PRIMEDEFENDER_BRIDGE_URL Yes* Bridge base URL, e.g. http://localhost:3000 (path /ingest is added if missing)
PRIMEDEFENDER_API_KEY Yes* API key sent as X-Api-Key / Authorization: Bearer
PRIMEDEFENDER_SITE_ID Yes* Site identifier in payloads
PRIMEDEFENDER_SITE_LAT Recommended Target latitude for map “to” pin
PRIMEDEFENDER_SITE_LON Recommended Target longitude
PRIMEDEFENDER_SITE_REGION_LABEL Optional Human label, e.g. Indonesia, BalitargetLabel = "{site_id} · {label}"
PRIMEDEFENDER_PRIVATE_SOURCE_LABEL Optional Label for private/loopback IPs
PRIMEDEFENDER_AUTH_BYPASS_MODE Optional observe (default) or block
PRIMEDEFENDER_SUSPICIOUS_REQUEST_MODE Optional observe (default) or block
PRIMEDEFENDER_MAX_ENCODING_LAYERS Optional Max nested percent-encoding depth allowed in query/body (default 3); deeper chains return 403 (excessive_encoding). Set 0 to disable.
PRIMEDEFENDER_FLOOD_WINDOW_SECONDS Optional Sliding window length in seconds for the global per-IP request rate (default 10).
PRIMEDEFENDER_FLOOD_MAX_REQUESTS Optional Max requests per IP per window before 429 / ddos detection (default 60).
PRIMEDEFENDER_FLOOD_EXEMPT_PATHS Optional Comma-separated paths not counted toward that limit. If unset, defaults to /health (for load-balancer probes). If set to an empty string, no paths are exempt.

*If bridge URL, API key, or site id is missing, reporting is disabled (middleware still runs detections).

See .env.example in this repository for tuning knobs (PRIMEDEFENDER_BODY_CAP_BYTES, rate limits, GeoIP TTL, etc.).

FastAPI usage

Minimal (configuration only from environment):

from fastapi import FastAPI
from primedefender_fastapi import PrimeDefenderMiddleware

app = FastAPI()
app.add_middleware(PrimeDefenderMiddleware)

Load .env early so variables exist when settings are first read:

from pathlib import Path
from dotenv import load_dotenv

load_dotenv(Path(__file__).resolve().parent / ".env")

Optional constructor overrides (other fields still come from the environment):

app.add_middleware(
    PrimeDefenderMiddleware,
    site_label="Indonesia, Bali",
    auth_bypass_mode="observe",
    suspicious_request_mode="block",
)

Explicit settings object (e.g. tests or multi-tenant):

from primedefender_fastapi import PrimeDefenderMiddleware, PrimeDefenderSettings

settings = PrimeDefenderSettings.from_env()
app.add_middleware(PrimeDefenderMiddleware, settings=settings)

Connect to the PrimeDefender bridge

  1. Run your bridge (often on port 3000 or behind HTTPS).
  2. Set PRIMEDEFENDER_BRIDGE_URL to that origin, e.g. http://localhost:3000.
  3. Ensure the bridge exposes POST /ingest (or set the full URL including path).
  4. Use a valid PRIMEDEFENDER_API_KEY accepted by the bridge.

Health check (typical): GET http://localhost:3000/health.

Test SQLi / XSS locally

With the API on port 8000:

SQL injection (query)

curl "http://127.0.0.1:8000/auth/login?next=' OR 1=1 --"

XSS

curl "http://127.0.0.1:8000/?q=%3Cscript%3Ealert(1)%3C/script%3E"

Map labels (optional test headers)

curl "http://127.0.0.1:8000/auth/login?next=' OR 1=1 --" \
  -H "X-Prime-Source-Lat: 34.6937" \
  -H "X-Prime-Source-Lon: 135.5023" \
  -H "X-Prime-Source-Label: Japan, Osaka"

Building and publishing

Uses hatchling (PEP 517):

pip install build
python -m build

Upload dist/* to PyPI with twine (use API tokens and trusted publishing in CI in production).

License

MIT — see LICENSE.

Repository

Placeholder links are set in pyproject.toml (Homepage / Repository). Replace with your real GitHub URL before publishing.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

primedefender_fastapi-0.1.4.tar.gz (12.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

primedefender_fastapi-0.1.4-py3-none-any.whl (16.0 kB view details)

Uploaded Python 3

File details

Details for the file primedefender_fastapi-0.1.4.tar.gz.

File metadata

  • Download URL: primedefender_fastapi-0.1.4.tar.gz
  • Upload date:
  • Size: 12.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.7

File hashes

Hashes for primedefender_fastapi-0.1.4.tar.gz
Algorithm Hash digest
SHA256 0c663507b12dee0df837e03dd16951578c8829e68d8e1b887dc5e7d453175513
MD5 ac09b2bf026b83f919a4f29af94a1e0f
BLAKE2b-256 9ad5a9d67571f4166a0dd61231fbeda7d9043f8ad273b36a6d635072c4682652

See more details on using hashes here.

File details

Details for the file primedefender_fastapi-0.1.4-py3-none-any.whl.

File metadata

File hashes

Hashes for primedefender_fastapi-0.1.4-py3-none-any.whl
Algorithm Hash digest
SHA256 2fda0c38d099220fe71b451b063c086766af8f7c9158d94e3860e842aee56cf8
MD5 1d45743014082d16fc3139665c152339
BLAKE2b-256 d33039e72db99d2ddc8eb3e39c83cf787cf1ca628b75b16eed463c4820edf577

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page