Default Limits
| Plan | Requests/min | Requests/day | Batch size |
|---|---|---|---|
| Free | 60 | 1,000 | 10 |
| Pro | 600 | 50,000 | 50 |
| Enterprise | Unlimited | Unlimited | 100 |
Rate Limit Headers
Every response includes rate limit headers:| Header | Description |
|---|---|
X-RateLimit-Limit | Max requests per window |
X-RateLimit-Remaining | Requests remaining |
X-RateLimit-Reset | Unix timestamp of reset |
Rate Limit Response
When rate limited, you’ll receive:429 Too Many Requests
Best Practices
1. Implement Exponential Backoff
2. Use Batch Endpoints
Instead of individual requests:3. Cache Results
Per-Endpoint Limits
Some endpoints have specific limits:| Endpoint | Limit |
|---|---|
/verify/batch | 100 items/request |
/verify/consensus | Per-tenant rate limit (same as default plan limits) |
/agent/register | 10/hour |
/attestation/verify | 1000/hour |
Fail-closed enforcement
When using Redis-backed rate limiting, the rate limiter operates with a fail-closed policy. If the Redis backend encounters an error at runtime, requests are denied rather than allowed through. This ensures that a temporary Redis outage does not silently bypass rate limits. If Redis is unavailable at startup, an in-memory fallback is used until the service is restarted with a healthy Redis connection.Enterprise options
For higher limits, contact us for:- Custom rate limits
- Dedicated infrastructure
- SLA guarantees