HyperRoute

Security That's Actually Included

Most GraphQL routers treat security as a paid add-on. We think that's backwards. HyperRoute includes comprehensive security in every deployment — free and paid.


Defense in Depth

HyperRoute protects your API at multiple layers:

LayerProtectionWhat It Stops
QueryDepth & complexity limitsResource exhaustion attacks
InputInjection detectionSQL, NoSQL, command injection
NetworkRate limiting & DDoS protectionDenial of service
DataPII filtering & header allowlistsData leakage

Query Limits

Every query is validated against these configurable limits:

ProtectionDefaultWhat It Prevents
Max Depth15 levelsDeeply nested query attacks
Max Length10KBOversized payload attacks
Max Complexity1000Expensive computed queries
Max Aliases50Alias bombing attacks

These defaults work for most applications. Adjust them in router.yaml if needed.


Injection Detection

HyperRoute automatically scans every request for common attack patterns:

SQL Injection

'; DROP TABLE users; --
' OR '1'='1
UNION SELECT * FROM passwords

NoSQL Injection

{ "$where": "malicious code" }
{ "$regex": ".*" }

Command Injection

; rm -rf /
| cat /etc/passwd
`whoami`

Path Traversal

../../../etc/passwd
..\..\windows\system32

When detected, requests are blocked immediately and the client's reputation score decreases.


Smart Rate Limiting

Rate limits adapt to client behavior over time:

BehaviorEffect
Consistent good requestsLimits gradually increase
Occasional errorsNo change to limits
Frequent limit hitsLimits decrease
Malicious patternsNear-zero access

This means well-behaved clients get better treatment, while bad actors get progressively restricted.


Data Protection

What We Never Log

By default, HyperRoute never captures:

  • Request bodies or variables
  • Response data
  • Authentication tokens
  • User identifiers

You can enable detailed logging for debugging, but it's off by default.

Header Allowlists

Only explicitly allowed headers are forwarded to subgraphs. This prevents accidental credential leakage — a common security issue in gateway architectures.

Immutable Artifacts

Every schema snapshot includes:

  • Content-addressed ID (same content = same ID)
  • Cryptographic checksums
  • Full audit trail

You can always verify that what's running is exactly what was deployed.


Audit Trail

Every action in HyperRoute is logged for compliance:

FieldExample
Whoalice@company.com
When2024-12-15T14:32:00Z
Whatschema.deployed
Detailsusers-v2.3.1 → production

Export for Compliance

Generate audit reports for SOC 2, HIPAA, or internal reviews:

hyperroute audit export --from 2024-01-01 --to 2024-12-31 --format csv

Configuration

Most security features work out of the box. Customize in router.yaml:

security:
  # Query limits
  max_depth: 15
  max_complexity: 1000
  max_aliases: 50
  
  # Rate limiting
  rate_limit:
    requests_per_second: 100
    burst: 200
  
  # Injection detection
  injection_detection:
    enabled: true
    action: block  # or "log" for monitoring mode

Security Checklist

Before going to production, verify:

  • Rate limits configured for your traffic patterns
  • Max depth/complexity tuned for your schema
  • Injection detection enabled (it's on by default)
  • Header allowlist reviewed
  • Audit logging connected to your SIEM

Next Steps