Skip to content

Node.js CAPTCHA Integration

The following tutorial will guide you on how to integrate the TrustCaptcha CAPTCHA solution into your Node.js backend to retrieve and evaluate the CAPTCHA verification result.

If you only need the simple case, the static shortcut is the shortest path:

import { TrustCaptcha } from "@trustcomponent/trustcaptcha-nodejs";
const result = await TrustCaptcha.getVerificationResult("<your_api_key>", "<verification_token_from_the_client>");
if (!result.verificationPassed || result.score > 0.5) {
// possibly an automated request
}

For everything beyond that — custom timeouts, a proxy, a custom API host — use the configured constructor further down.


You should have already completed the following steps before you start with CAPTCHA validation in your Node.js backend.

  1. Read the basic Information: For a basic overview, please read the get started guide. We also recommend that you familiarize yourself with the technical concept of TrustCaptcha.

  2. Existing CAPTCHA: If you don’t have a CAPTCHA yet, sign in or create a new user account. Then create a new CAPTCHA.

  3. A frontend with TrustCaptcha: Integrate the TrustCaptcha widget into your frontend. Go to the CAPTCHA widget guide.

  4. Existing Node.js project: You need a Node.js project in which you want to integrate TrustCaptcha.

  5. Verification token: You need the verification token from your frontend, which you receive every time you successfully solve the CAPTCHA.


Follow the three steps below to retrieve and evaluate the CAPTCHA verification result in your Node.js backend.

You can find the source code of our Node.js CAPTCHA integration on Github.

To use the TrustCaptcha Node.js library, you first need to add the corresponding dependencies to your project.

Terminal window
npm i @trustcomponent/trustcaptcha-nodejs@^3.0.0

You can find our TrustCaptcha Node.js package on npmjs.com.

In the next step, retrieve the CAPTCHA result from our servers.

If the CAPTCHA widget has been successfully solved in the frontend, you will receive a so-called verification token. Send this to your backend. You will also need an api-key. You can manage your API keys in the dashboard of your CAPTCHA.

Use the TrustCaptcha class of our Node.js integration to retrieve the verification result from our servers. For the simple case use the static shortcut shown right below; for advanced configuration (custom API host, timeouts, proxy) use the builder/constructor variant further down on this page.

// Retrieving the verification result
let verificationResult;
try {
verificationResult = await TrustCaptcha.getVerificationResult("<your_api_key>", "<verification_token_from_the_client>");
} catch (error) {
// Fetch verification result failed - handle error
}

Once you have successfully fetched the verification result, you can plan your next steps based on it. A concrete overview of all the information contained in the verification result and their respective meanings can be found in the result validation overview.

// Act on the verification result
if (!verificationResult.verificationPassed || verificationResult.score > 0.5) {
console.log("Verification failed or bot score > 0.5 – possible automated request.");
}

If you need more control — a different API host, custom timeouts, or a proxy — instantiate TrustCaptcha directly with an options object. The static shortcut always uses the defaults.

import { TrustCaptcha } from "@trustcomponent/trustcaptcha-nodejs";
const trustCaptcha = new TrustCaptcha({
apiKey: "<your_api_key>",
apiHost: "https://api.trustcomponent.com",
connectTimeoutMs: 3000,
readTimeoutMs: 5000,
proxy: {
host: "proxy.example.com",
port: 8080,
auth: { username: "myProxyUser", password: "myProxyPassword" }, // optional
},
});
const result = await trustCaptcha.getVerificationResult("<verification_token_from_the_client>");

A constructed TrustCaptcha instance is immutable and safe to share: build it once at application startup and reuse it for all requests.

FieldTypeDefaultDescription
apiKeystring (required)Your API key. Must not be empty.
apiHoststringhttps://api.trustcomponent.comOverride the API host. Useful for staging environments.
connectTimeoutMsnumber3000Connect timeout in milliseconds. (Used as part of axios’ timeout.)
readTimeoutMsnumber5000Total request timeout in milliseconds.
proxyAxiosProxyConfig | falsenoneAn axios proxy configuration object, or false to disable proxies.

Our service runs in a high-availability setup, so outages are rare in practice. If you want maximum availability — even for the unlikely case where our service is unreachable — you can decide upfront how your backend should react, so your forms and processes don’t block during such an event. Read the Failover behavior page first — it covers the concept, the required widget-side opt-in, the operational checklist, and how to filter failover-derived results in high-security flows.

Once you’ve decided on a policy, the library throws two typed exceptions that both extend FailoverException:

  • ServerUnreachableExceptionhigh-trust (your backend cannot reach our servers). For example: allow the request and log the incident.
  • ClientReportedServerUnreachableException (HTTP 412) — low-trust (the widget claimed a failover, but the backend reaches us fine). For example: reject or soft-challenge.
try {
const result = await trustCaptcha.getVerificationResult(token);
// Handle the result as you normally would (verificationPassed, score, your own policy).
} catch (e) {
if (e instanceof ServerUnreachableException) {
// Example: our servers are unreachable. Allow + log.
} else if (e instanceof ClientReportedServerUnreachableException) {
// Example: widget claimed an outage but the backend reaches us. Reject or soft-challenge.
} else {
// Other error.
}
}

When the result cannot be retrieved successfully the library raises a typed exception.

ExceptionWhen it is thrown
ApiKeyInvalidExceptionThe API key was rejected (HTTP 403).
VerificationTokenInvalidExceptionThe verification token could not be parsed (malformed base64 / missing verificationId).
VerificationNotFoundExceptionNo verification was found for the given verification token (HTTP 404).
VerificationNotFinishedExceptionThe verification has not yet been completed by the user (HTTP 423).
VerificationResultExpiredExceptionThe result has expired and can no longer be retrieved (HTTP 410).
VerificationResultRetrievalLimitReachedExceptionThe result has reached its maximum retrieval count (HTTP 429).
ServerUnreachableExceptionThe TrustCaptcha server could not be reached at all (connection error / timeout). Subclass of FailoverException. See Failover behavior.
ClientReportedServerUnreachableExceptionThe widget claimed a failover, but the gateway has no record of a recent outage (HTTP 412). Subclass of FailoverException. See Failover behavior.

The following example shows a possible implementation of TrustCaptcha in a Node.js backend.

In this example: When a POST request is sent to /api/example, the CAPTCHA verification token is sent to the Node.js backend in the request body. In the backend, our library is used to retrieve the CAPTCHA verification result from our servers and evaluate it. If the verification fails or the bot score exceeds 0.5, a warning is displayed. In addition, the entire verification result is returned to the client.

Hint: The steps and thresholds shown are examples and should be adapted to your individual requirements in your specific use case.

The complete example including source code can be found on Github.

import express from 'express';
import cors from 'cors';
import { json } from 'body-parser';
import { TrustCaptcha } from "@trustcomponent/trustcaptcha-nodejs";
const app = express();
app.use(cors({ origin: '*' }));
app.use(json());
app.post('/api/example', async (req, res) => {
const verificationToken = req.body.verificationToken;
// Retrieving the verification result
let verificationResult;
try {
verificationResult = await TrustCaptcha.getVerificationResult("<your_api_key>", verificationToken);
} catch (error) {
// Fetch verification result failed - handle error
console.error(error)
res.status(500).send('Internal Server Error');
return
}
// Act on the verification result
if (!verificationResult.verificationPassed || verificationResult.score > 0.5) {
console.log("Verification failed or bot score > 0.5 – possible automated request.");
}
res.json(verificationResult);
});
app.listen(8080, () => {
console.log('Server is running on http://localhost:8080');
});

Once you have integrated the TrustCaptcha widget into your frontend and the CAPTCHA result validation into your backend, you can use TrustCaptcha to its full extent. However, we still recommend the following additional technical and organizational measures:

  • Security rules: You can find many security settings for your CAPTCHA in the CAPTCHA settings. These include, for example, authorized websites, CAPTCHA bypass for specific IP addresses, bypass keys, IP based blocking, geoblocking, individual difficulty and duration of the CAPTCHA, and much more. Learn more about the security rules.

  • Privacy & GDPR compliance: Include a passage in your privacy policy that refers to the use of TrustCaptcha. We also recommend that you enter into a data processing agreement with us to stay GDPR-compliant. Learn more about data protection.

  • Accessibility & UX: Customize TrustCaptcha to your website so that your website is as accessible as possible and offers the best possible user experience. More about accessibility.

  • Failover behavior: Decide how your backend should behave when our service is temporarily unreachable. This is particularly important for high-availability flows where blocking real users during an outage is worse than letting through a small amount of unverified traffic. Learn more about failover behavior.

  • Testing: If you use automated testing, make sure that the CAPTCHA does not block it. Learn more about testing.