Created on 30 June 2025, about 2 months ago

Right now, this module is rather simple. It has two means to identify and block potential bots.

  1. By the a defined user agent substring - i.e. a self-identified bot
  2. By detecting older browser versions that are unlikely to be used by a real person in this age of automatic updates (for now at least).

I haven't tagged a release for this module yet, because I am envisioning more for this module. What I'd to do is implement additional methods for blocking bots, but then instead of just blocking a request based on meeting a single criteria of many, be a little smart about it, and take an approach used by more genuine WAF tools, and build a risk assessment score, and block based on some threshold. Here is the path.

Define detection methods as a set of Plugins, with corresponding config entities. Each with a definable weighting to the risk score, and their own configurations. Site admins can create their own set of rules, and thresholds based on their own risk tolerance.

So this leads to some additional questions. A big part of the approach of this module is to keep it lightweight, and minimize any database read/writes, to reduce the resources used by serving these bot requests. Does moving to a more Plugin based model like what I described above nullify this effort? Am I simply over-engineering this?

More to come...

🌱 Plan
Status

Active

Component

Code

Created by

πŸ‡ΊπŸ‡ΈUnited States bburg Washington, DC

Live updates comments and jobs are added and updated live.
Sign in to follow issues

Comments & Activities

Production build 0.71.5 2024