Rate Limits
Understanding Rate Limits
Scrapest implements rate limiting to ensure fair usage and system stability:- API Requests: Limited per API key per time window
- Webhook Delivery: Limited per webhook endpoint
- Streaming Connections: Limited concurrent connections per API key
- Data Processing: Limited based on your subscription tier
Handling Rate Limits
Always implement proper rate limit handling:Rate Limit Best Practices
- Monitor Response Headers: Check
X-RateLimit-RemainingandX-RateLimit-Reset - Implement Queuing: Use request queues for high-volume operations
- Distribute Load: Spread requests across time windows
- Handle Gracefully: Always catch 429 responses and retry appropriately
API Key Security
Secure API Key Management
Never expose API keys in your code or repositories:Environment Configuration
Set up environment variables securely:Webhook Security
Secure your webhook endpoints with token validation When registering webhooks, include a token for validation:Validating Incoming Webhooks
Always validate webhook requests before processing:Security Best Practices
Essential Security Rules
- Never Commit API Keys: Add API keys to .gitignore
- Use Environment Variables: Store keys in environment, not code
- Implement Least Privilege: Use minimal required permissions
- Monitor Usage: Track API key usage and anomalies
- Rotate Regularly: Change API keys periodically
- Use HTTPS: Always use secure connections
- Validate Input: Sanitize all incoming data
Environment Setup
Common Mistakes to Avoid
Rate Limit Mistakes
- ❌ Ignoring 429 responses
- ❌ No retry logic with backoff
- ❌ Not monitoring rate limit headers
Security Mistakes
- ❌ Hardcoding API keys in source code
- ❌ Not validating webhook signatures
- ❌ Sharing API keys publicly
Quick Checklist
Before deploying your Scrapest integration:- API keys stored in environment variables
- Rate limit handling implemented
- HTTPS used for all connections
- Error handling with retry logic