Step 1: Sign Up with Botpoison
First, you must sign up for Botpoison to receive the keys required for integration. If you already have an account and Botpoison configuration (keys) for your site, you can move to the next step.- Visit Botpoison’s website, register for an account, and sign in.
- Click on the Create configuration button and fill in the website name.
- Finish the setup using the “Create” button.
- Public Key: Implemented on your site to initiate the protection.
- Secret Key: Used server-side to validate submissions. Ensure this remains private and secure.
Step 2: Implement Botpoison on Your Site
Integrate Botpoison into your site by including the Botpoison script in the HTML of your webpage and adding adata-botpoison-public-key
attribute on your form
tag. Visit Botpoison Docs for details and ready-to-use code examples.
Step 3: Configure Botpoison in Comfyform Dashboard
Configuring Botpoison in Comfyform is straightforward and can be completed in a few simple steps:- Log into your Comfyform dashboard.
- Select the Forms section and choose the form you’d like to secure.
- Click on the Security tab.
- Find Botpoison and click on “Activate” or “Modify”.
- Enter your Botpoison Secret Key in the field provided.
- Save your changes by clicking on the Save changes button.
Step 4: Test Your Botpoison Integration
Once Botpoison is configured both in Comfyform and on your website, it’s crucial to test your integration. Submit the form to make sure Botpoison validates the entries without user intervention and the submission is displayed in your Comfyform Dashboard without the spam flag. Conducting these tests guarantees that your real users have a frictionless experience while bots are prevented from spamming the forms.Understanding Botpoison’s Protection
Botpoison thwarts bots using a combination of techniques:- Hashcash: A cryptographic proof-of-work algorithm.
- IP Reputation Checks: Cross-reference IPs with proprietary and third-party datasets.
- IP Rate-limits: Control the number of requests from unique IPs.
- Session and Request Analysis: Monitor behavior to distinguish bots from human users.