Rate limits
The rate-limit model is already implemented in three layers.
The codebase currently uses a distributed rate limiter with an Upstash Redis-backed path and an in-memory fallback. Public copy should describe the actual model instead of pretending rate limiting is a generic afterthought.
IP burst guard
Default: 120 requests per minute per IP. Applied before authentication to protect the platform from unauthenticated request bursts.
Per-agent sliding window
Default helper: 60 requests per minute per agent or route identifier, with route-level customization available in the code.
Per-tenant quota
Default helper: 5000 requests per hour per tenant to stop one org from overwhelming shared platform capacity.
X-RateLimit-Limit, X-RateLimit-Remaining, and Retry-After.
Need the API behavior mapped by route class?
Use the API and authentication pages alongside this one if you are reviewing how browser, agent, and automation traffic is handled in the platform.