Aegis Shield
Aegis Shield is Aegis’ built-in challenge system for filtering automated traffic before a request is ever proxied to the upstream application.What It Does
- Intercepts requests at the proxy layer before the WAF and upstream
- Issues an internal challenge from Aegis itself with no third-party CAPTCHA dependency
- Combines proof-of-work, passive browser verification, and optionally an interactive checkbox step
- Sets a signed host-scoped pass cookie after successful verification so later requests pass normally until the cookie expires
How It Works
- A protected host receives a request
- If the client does not already have a valid
aegis_shieldcookie, Aegis serves the Shield page instead of proxying upstream - The browser runs Phase 1 passive verification:
- Proof-of-work computation
- Rotating browser probe subset
- Depending on the configured mode and passive confidence score, Aegis either:
- Passes immediately
- Requires the interactive checkbox
- Rejects the request as bot-like
- If the checkbox is required, Aegis collects interaction data (mouse trajectory, hover time, click timing, path entropy) before issuing the pass cookie
Shield Modes
managed (default)
- Runs passive verification first
- Auto-passes clearly human traffic
- Shows the checkbox only for ambiguous traffic
- Hard-fails clearly bot-like traffic without offering the checkbox
invisible
- Never shows the checkbox
- Pass/fail is based only on passive verification and proof-of-work
- Best when you want zero visible challenge UI for normal visitors and are comfortable with stricter automatic decisions
interactive
- Always shows the checkbox after passive verification completes
- Useful when you explicitly want a visible confirmation step for every challenged visitor
- Still uses the passive phase first, but does not auto-pass based on passive confidence alone
Per-Host Settings
| Setting | Description |
|---|---|
| Enable Shield Challenge | Toggle Shield on/off per host |
| Mode | managed, invisible, or interactive |
| Difficulty | Proof-of-work difficulty level |
| Cookie Duration | How long the pass cookie remains valid |
| Exempt Paths | URL paths that bypass the challenge |
| Exempt CIDRs | IP ranges that bypass the challenge |
| Exempt User-Agents | User-Agent strings that bypass the challenge |
Configuration
Shield is configured per proxy host:- Admin UI -> Hosts -> edit a proxy host -> Aegis Shield Challenge
- Admin UI -> Config -> Bots
Use Cases
- Protecting admin panels or staging environments from commodity bots
- Forcing a stronger anti-automation gate in front of login or sensitive application paths
- Reducing AI scraping, scanner noise, and scripted abuse before it reaches the upstream app

